Sciweavers

40 search results - page 8 / 8
» Courier Assignment in Social Networks
Sort
View
SIGCSE
2010
ACM
183views Education» more  SIGCSE 2010»
13 years 11 months ago
Electronic commerce virtual laboratory
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
Joel Coffman, Alfred C. Weaver
CCS
2006
ACM
13 years 9 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
CSWWS
2006
13 years 9 months ago
A Trust Model for Sharing Ratings of Information Providers on the Semantic Web
In the context of the Semantic Web, it may be beneficial for a user (consumer) to receive ratings from other users (advisors) regarding the reliability of an information source (pr...
Jie Zhang, Robin Cohen
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 5 months ago
Detecting Coordination Problems in Collaborative Software Development Environments
Software development is rarely an individual effort and generally involves teams of developers collaborating to generate good reliable code. Among the software code there exist te...
Chintan Amrit, Jos van Hillegersberg
SC
2009
ACM
14 years 1 days ago
Evaluating use of data flow systems for large graph analysis
Large graph analysis has become increasingly important and is widely used in many applications such as web mining, social network analysis, biology, and information retrieval. The...
Andy Yoo, Ian Kaplan