Sciweavers

2061 search results - page 39 / 413
» Authorization for Metacomputing Applications
Sort
View
ESSOS
2011
Springer
14 years 4 months ago
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications
Abstract. The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distribu...
Philippe De Ryck, Lieven Desmet, Wouter Joosen
EUSFLAT
2009
209views Fuzzy Logic» more  EUSFLAT 2009»
14 years 10 months ago
Application of Fuzzy Vectors of Normalized Weights in Decision Making Models
In this paper, the notion of a fuzzy vector of normalized weights is introduced, and its application in decision making models based on the weighted average operation is studied. T...
Ondrej Pavlacka, Jana Talasová
166
Voted
CHI
2011
ACM
14 years 4 months ago
I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application
There have been many location sharing systems developed over the past two decades, and only recently have they started to be adopted by consumers. In this paper, we present the re...
Janne Lindqvist, Justin Cranshaw, Jason Wiese, Jas...
140
Voted
SOCIALCOM
2010
14 years 10 months ago
A Methodology for Integrating Network Theory and Topic Modeling and its Application to Innovation Diffusion
Text data pertaining to socio-technical networks often are analyzed separately from relational data, or are reduced to the fact and strength of the flow of information between node...
Jana Diesner, Kathleen M. Carley
CHI
2011
ACM
14 years 4 months ago
Characterizing the usability of interactive applications through query log analysis
People routinely rely on Internet search engines to support their use of interactive systems: they issue queries to learn how to accomplish tasks, troubleshoot problems, and other...
Adam Fourney, Richard Mann, Michael Terry