Sciweavers

3451 search results - page 158 / 691
» Collaborative attack modeling
Sort
View
101
Voted
ICSOC
2005
Springer
15 years 8 months ago
Trust-Based Secure Workflow Path Construction
—Service-oriented computing promotes collaboration by defining the standards layer that allows compatibility between disparate domains. Workflows, by taking advantage of the serv...
Mine Altunay, Douglas E. Brown, Gregory T. Byrd, R...
106
Voted
CANDC
2007
ACM
15 years 6 months ago
Constrain yourselves: exploring end user development in support for musical creativity
This research explores links between constraint development in creative processes and end user development in environments for creative tasks. A process model describing the devel...
Tim Coughlan, Peter Johnson
137
Voted
CDVE
2006
Springer
109views Visualization» more  CDVE 2006»
15 years 6 months ago
Use of Patterns for Knowledge Management in the Ceramic Tile Design Chain
Knowledge Management (KM) is a complex objective, especially in the instance of extended enterprises consisting of SMEs, and critical in new product design and development (NPD). T...
María Jesús Agost, Fernando Romero, ...
104
Voted
AIEDU
2005
83views more  AIEDU 2005»
15 years 2 months ago
A Simulated Student Can Improve Collaborative Learning
This paper describes a Simulated Student architecture designed to detect and avoid three situations that decrease the benefits of learning in collaboration. These are off-topic con...
Aurora Vizcaíno
126
Voted
ICC
2011
IEEE
162views Communications» more  ICC 2011»
14 years 2 months ago
Wi-Fi-Based Indoor Positioning Using Human-Centric Collaborative Feedback
—In recent years, “folksonomy”-like systems such as Wikipedia and Delicious Social Bookmarking have achieved huge successes. User collaboration is the defining characteristi...
Yan Luo, Yuanzhu Chen, Orland Hoeber