Sciweavers

1733 search results - page 126 / 347
» Critical Information Systems Research: A Habermasian Approac...
Sort
View
CAD
2000
Springer
15 years 1 months ago
Managing digital libraries for computer-aided design
This paper describes our initial efforts to deploy a digital library to support computer-aided collaborative design. At present, this experimental testbed, The Engineering Design ...
William C. Regli, Vincent A. Cicirello
KI
2002
Springer
15 years 1 months ago
Adaptivity through Unobstrusive Learning
In this paper, we present an approach for learning interest profiles implicitly from positive user observations only. This approach eliminates the need to prompt users for ratings...
Ingo Schwab, Alfred Kobsa
109
Voted
CIDM
2009
IEEE
15 years 8 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
15 years 1 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
WIDM
2003
ACM
15 years 6 months ago
Answering imprecise database queries: a novel approach
A growing number of databases especially those published on the Web are becoming available to external users. Users of these databases are provided simple form-based query interfa...
Ullas Nambiar, Subbarao Kambhampati