Sciweavers

QEST
2010
IEEE
13 years 2 months ago
Information Hiding in Probabilistic Concurrent Systems
Information hiding is a general concept which refers to the goal of preventing an adversary to infer secret information from the observables. Anonymity and Information Flow are exa...
Miguel E. Andrés, Catuscia Palamidessi, Pet...
NBIS
2010
Springer
13 years 2 months ago
A New Ontology-Supported and Hybrid Recommending Information System for Scholars
A new ontology-supported and hybrid recommending information system for scholars was proposed. Not only can it fast integrate specific domain documents, but also it can extract imp...
Sheng-Yuan Yang, Chun-Liang Hsu
MDAI
2010
Springer
13 years 2 months ago
Rational Privacy Disclosure in Social Networks
Social networking web sites or social networks for short (SNs) have become an important web service with a broad range of applications. In an SN, a user publishes and shares inform...
Josep Domingo-Ferrer
KBSE
2010
IEEE
13 years 2 months ago
VikiBuilder: end-user specification and generation of visual wikis
With the need to make sense out of large and constantly growing information spaces, tools to support information management are becoming increasingly valuable. In prior work we pr...
Christian Hirsch, John G. Hosking, John C. Grundy
IPAW
2010
13 years 2 months ago
Securing Provenance-Based Audits
Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such ...
Rocío Aldeco-Pérez, Luc Moreau
IPAW
2010
13 years 2 months ago
Publishing and Consuming Provenance Metadata on the Web of Linked Data
The World Wide Web evolves into a Web of Data, a huge, globally distributed dataspace that contains a rich body of machineprocessable information from a virtually unbound set of pr...
Olaf Hartig, Jun Zhao
IKE
2010
13 years 2 months ago
Towards Context-Aware Real-Time Information Dissemination
Real-time information dissemination is essential for the success of key applications such as transportation management and battlefield monitoring. In these applications, relevant ...
Kyoung-Don Kang, Greg Vert
IFIP12
2010
13 years 2 months ago
Event Extraction for Legal Case Building and Reasoning
We are interested in developing tools to support the activities of lawyers in corporate litigation. In current applications, information such as characters that have played a signi...
Nikolaos Lagos, Frédérique Segond, S...
IAT
2010
IEEE
13 years 2 months ago
An Agent-Based Model for the Interplay of Information and Emotion in Social Diffusion
The spread of information and emotion within groups is studied in models of social diffusion. Evidence has been found that the emotional states of humans affect their information ...
Mark Hoogendoorn, Jan Treur, C. Natalie van der Wa...
GROUP
2010
ACM
13 years 2 months ago
Searching for reputable source code on the web
Looking for source code on the Web is a common practice among software developers. Previous research has shown that developers use social cues over technical cues to evaluate sour...
Rosalva E. Gallardo-Valencia, Phitchayaphong Tanti...