Sciweavers

1725 search results - page 242 / 345
» Feature-based recommendation system
Sort
View
COMPSEC
2004
156views more  COMPSEC 2004»
15 years 4 months ago
Computer security impaired by legitimate users
Computer security has traditionally been assessed from a technical point of view. Another way to assess it is by investigating the role played by legitimate users of systems in imp...
Denis Besnard, Budi Arief
CCR
1998
75views more  CCR 1998»
15 years 4 months ago
A comparative analysis of groupware application protocols
Two of the most difficult problems faced by developers of synchronous groupware applications are the handling of multiple session connections and the maintenance of replicated dat...
Mark Pendergast
EGOV
2010
Springer
15 years 3 months ago
Information Strategies for Open Government: Challenges and Prospects for Deriving Public Value from Government Transparency
Information-based strategies to promote open government offer many opportunities to generate social and economic value through public use of government information. Public and poli...
Sharon S. Dawes, Natalie Helbig
JOC
2010
106views more  JOC 2010»
15 years 2 months ago
A Taxonomy of Pairing-Friendly Elliptic Curves
Elliptic curves with small embedding degree and large prime-order subgroup are key ingredients for implementing pairingbased cryptographic systems. Such “pairing-friendly” curv...
David Freeman, Michael Scott, Edlyn Teske
GI
2010
Springer
15 years 1 months ago
Elicitation of Preferences for Web Service Compositions
Abstract: Preference elicitation is often used in e-services to create product recommendations for their customers. We present an approach for applying preference elicitation techn...
Carolin Michels, Sudhir Agarwal