Sciweavers

1407 search results - page 236 / 282
» Information Evolution in Social Networks
Sort
View
118
Voted
AEI
2007
119views more  AEI 2007»
15 years 18 days ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
94
Voted
CLEIEJ
2008
88views more  CLEIEJ 2008»
15 years 17 days ago
A Trust Model for a Group of E-mail Servers
E-mail services are essential in the Internet. However, the current e-mail architecture presents problems that open it to several threats. Alternatives have been proposed to solve...
Leonardo de Oliveira, Carlos Maziero
78
Voted
COMPSEC
2006
90views more  COMPSEC 2006»
15 years 15 days ago
On Incident Handling and Response: A state-of-the-art approach
Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a techn...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
IJMMS
2008
99views more  IJMMS 2008»
15 years 14 days ago
Storied spaces: Cultural accounts of mobility, technology, and environmental knowing
When we think of mobility in technical terms, we think of topics such as bandwidth, resource management, location, and wireless networks. When we think of mobility in social or cu...
Johanna Brewer, Paul Dourish
89
Voted
GIS
2000
ACM
15 years 8 days ago
Actor-networks and implementation: examples from conservation GIS in Ecuador
Recommendationsfor implementationand evaluation of Geographical Information Systems (GIS) can bene t from a broader theoretical foundation to support investigation, understanding a...
Eugene W. Martin