Sciweavers

517 search results - page 59 / 104
» Web service security management using semantic web technique...
Sort
View
ECEH
2006
120views Healthcare» more  ECEH 2006»
15 years 5 months ago
Efficient Networking for Pervasive eHealth Applications
: This paper presents the networking architecture developed in the CASCOM research project. This architecture provides an efficient and reliable communication support and service d...
Heikki Helin, Tim Van Pelt, Michael Schumacher, Ah...
ATC
2009
Springer
15 years 7 months ago
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models ...
Martin Serrano, Sven van der Meer, John Strassner,...
KDD
2005
ACM
218views Data Mining» more  KDD 2005»
16 years 4 months ago
A maximum entropy web recommendation system: combining collaborative and content features
Web users display their preferences implicitly by navigating through a sequence of pages or by providing numeric ratings to some items. Web usage mining techniques are used to ext...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
16 years 4 months ago
Web usage mining based on probabilistic latent semantic analysis
The primary goal of Web usage mining is the discovery of patterns in the navigational behavior of Web users. Standard approaches, such as clustering of user sessions and discoveri...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
BIS
2007
183views Business» more  BIS 2007»
15 years 5 months ago
A Conceptual Framework for Composition in Business Process Management
In this work, we present a conceptual framework for deriving executable business process models from high-level, graphical business process models based on the paradigm of Service-...
Ingo Weber, Ivan Markovic, Christian Drumm