Sciweavers

3544 search results - page 420 / 709
» Information Security in Open Systems
Sort
View
WER
2007
Springer
15 years 6 months ago
Towards Variability Design as Decision Boundary Placement
Complex information systems have numerous design variables that are systematically decided upon during the design process. In high-variability systems, some of these decisions are...
Catalin Bidian, Eric S. K. Yu
AIR
2002
65views more  AIR 2002»
14 years 11 months ago
User Modeling for Personalized City Tours
Several current support systems for travel and tourism are aimed at providing information in a personalized manner, taking users' interests and preferences into account. In t...
Josef Fink, Alfred Kobsa
WWW
2005
ACM
16 years 16 days ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
ESAW
2009
Springer
15 years 6 months ago
Peer-to-Peer Overlay Network Based on Swarm Intelligence
As the number of information in the Internet constantly increases and the complexity of systems rapidly grows, locating and manipulating complex data has become a difficult task. W...
Vesna Sesum-Cavic, eva Kühn
ISW
2009
Springer
15 years 6 months ago
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
Abstract. The complexity of modern network architectures and the epidemic diffusion of malware require collaborative approaches for defense. We present a novel distributed system ...
Mirco Marchetti, Michele Messori, Michele Colajann...