Sciweavers

1587 search results - page 175 / 318
» Access Control for Shared Resources
Sort
View
93
Voted
JASIS
2010
141views more  JASIS 2010»
14 years 11 months ago
Member activities and quality of tags in a collection of historical photographs in Flickr
There is growing interest in, and an increasing number of attempts by, traditional information providers to engage social content creation and sharing communities in creating and ...
Besiki Stvilia, Corinne Jörgensen
91
Voted
OZCHI
2006
ACM
15 years 6 months ago
Question-based group authentication
There are various situations where a distinction needs to be made between group members and outsiders. For example, to protect students in chat groups from unpleasant incidents ca...
Ann Nosseir, Richard C. H. Connor, Karen Renaud
90
Voted
LCN
2005
IEEE
15 years 6 months ago
Light-Trail Networks: Design and Survivability
The light-trail architecture provides a novel solution to address IP-centric issues at the optical layer. By incorporating drop and continue functionality, overlaid with a lightwe...
Srivatsan Balasubramanian, Wensheng He, Arun K. So...
112
Voted
GCC
2004
Springer
15 years 6 months ago
Integrating Trust in Grid Computing Systems
A Grid computing system is a virtual resource framework. Inside the framework, resources are being shared among autonomous domains which can be geographically distributed. One prim...
Woodas W. K. Lai, Kam-Wing Ng, Michael R. Lyu
114
Voted
RECSYS
2009
ACM
15 years 7 months ago
Latent dirichlet allocation for tag recommendation
Tagging systems have become major infrastructures on the Web. They allow users to create tags that annotate and categorize content and share them with other users, very helpful in...
Ralf Krestel, Peter Fankhauser, Wolfgang Nejdl