Sciweavers

SIN
2010
ACM
13 years 6 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
SIN
2010
ACM
13 years 6 months ago
Analysis of privacy in online social networks of runet
In recent years, social networking sites (SNSs) gained high popularity among Internet users as they combine the best of both worlds: befriending people outside real life situation...
Slava Kisilevich, Florian Mansmann
SIGIR
2010
ACM
13 years 6 months ago
Using local precision to compare search engines in consumer health information retrieval
We have conducted a user study to evaluate several generalist and health-specific search engines on health information retrieval. Users evaluated the relevance of the top 30 docum...
Carla Teixeira Lopes, Cristina Ribeiro
SIGIR
2010
ACM
13 years 6 months ago
DivQ: diversification for keyword search over structured databases
Keyword queries over structured databases are notoriously ambiguous. No single interpretation of a keyword query can satisfy all users, and multiple interpretations may yield over...
Elena Demidova, Peter Fankhauser, Xuan Zhou, Wolfg...
SAICSIT
2010
ACM
13 years 6 months ago
Determining the user profile for an adaptable training platform
Adaptive computer-based training systems aim to enhance the learning experience by personalising the presentation and content delivery according to the preferences of each particu...
Mardé Greeff, Quentin Williams, Roné...
SAICSIT
2010
ACM
13 years 6 months ago
Towards energy efficient mobile communications
The rapid growth and development of wireless communication services and applications corresponds to an increase in associated energy consumption. For broadband wireless network de...
Moshe T. Masonta, Mjumo Mzyece, Ntsibane Ntlatlapa
SAICSIT
2010
ACM
13 years 6 months ago
Numberplate detection using double segmentation
Numberplate detection plays an important role in public transportation systems. Before numberplate detection can be performed, the region of interest that contains the numberplate ...
Pei Li, James Connan
SAICSIT
2010
ACM
13 years 6 months ago
Critical success factors for information systems outsourcing management: a software development lifecycle view
Information systems (IS) outsourcing is a serious commitment
Hanlie Smuts, Alta van der Merwe, Paula Kotz&eacut...
SAICSIT
2010
ACM
13 years 6 months ago
Determining requirements within an indigenous knowledge system of African rural communities
Eliciting and analyzing requirements within knowledge systems, which fundamentally differ so far from technology supported systems represent particular challenges. African rural c...
Heike Winschiers-Theophilus, Nicola J. Bidwell, Sh...
RCIS
2010
13 years 6 months ago
A conceptual model and process for client-driven agile requirements prioritization
Continuous customer-centric requirements reprioritization is essential in successfully performing agile software development. Yet, in the agile RE literature, very little is known ...
Zornitza Racheva, Maya Daneva, Andrea Herrmann, Ro...