Sciweavers

WISE
2010
Springer
13 years 2 months ago
On Identifying and Reducing Irrelevant Information in Service Composition and Execution
The increasing availability of massive information on the Web causes the need for information aggregation by filtering and ranking according to user's goals. In the last years...
Hong Linh Truong, Marco Comerio, Andrea Maurino, S...
WEBI
2010
Springer
13 years 2 months ago
Impacts of Analysts' Cognitive Styles on the Analytic Process
A user's cognitive style has been found to affect how they search for information, how they analyze the information, and how they make decisions in an analytical process. In ...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Deqing Li,...
UM
2010
Springer
13 years 2 months ago
Mobile Web Profiling: A Study of Off-Portal Surfing Habits of Mobile Users
Abstract. The World Wide Web has provided users with the opportunity to access from any computer the largest set of information ever existing. Researchers have analyzed how such us...
Daniel Olmedilla, Enrique Frías-Martí...
SOCIALCOM
2010
13 years 2 months ago
A Decision Theoretic Approach to Data Leakage Prevention
Abstract--In both the commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information. In this paper we address the threat of infor...
Janusz Marecki, Mudhakar Srivatsa, Pradeep Varakan...
SOCIALCOM
2010
13 years 2 months ago
Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach
We address the problem of enabling clients to regulate disclosure of their credentials and properties when interacting with servers in open scenarios. We provide a means for client...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
SOCIALCOM
2010
13 years 2 months ago
Managed Mission Assurance - Concept, Methodology and Runtime Support
We interpret "mission assurance" to mean the guarantee that Mission Essential Functionality (MEF) provided by an information system is continued despite partial failures ...
Partha Pratim Pal, Kurt Rohloff, Michael Atighetch...
SOCIALCOM
2010
13 years 2 months ago
Securing Shareable Life-logs
Sharing life-log information in a social community has many advantages, both for the user and society. But sharing any type of personal information is a threat to privacy. In parti...
Reza Rawassizadeh, A Min Tjoa
SIN
2010
ACM
13 years 2 months ago
Analysis of privacy in online social networks of runet
In recent years, social networking sites (SNSs) gained high popularity among Internet users as they combine the best of both worlds: befriending people outside real life situation...
Slava Kisilevich, Florian Mansmann
SIGDIAL
2010
13 years 2 months ago
YouBot: A Simple Framework for Building Virtual Networking Agents
This paper proposes a simple framework for building 'virtual networking agents'; programs that can communicate with users and collect information through the internet. T...
Seiji Takegata, Kumiko Tanaka-Ishii
SEMWEB
2010
Springer
13 years 2 months ago
Toponym Resolution in Social Media
Increasingly user-generated content is being utilised as a source of information, however each individual piece of content tends to contain low levels of information. In addition, ...
Neil Ireson, Fabio Ciravegna