Sciweavers

3544 search results - page 442 / 709
» Information Security in Open Systems
Sort
View
ITRUST
2004
Springer
15 years 5 months ago
Analyzing Correlation between Trust and User Similarity in Online Communities
Abstract. Past evidence has shown that generic approaches to recommender systems based upon collaborative filtering tend to poorly scale. Moreover, their fitness for scenarios su...
Cai-Nicolas Ziegler, Georg Lausen
NCA
2003
IEEE
15 years 5 months ago
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources...
Michael Atighetchi, Partha Pratim Pal, Franklin We...
CLEF
2003
Springer
15 years 5 months ago
UNED at iCLEF 2003: Searching Cross-Language Summaries
The UNED phrase-based cross-language summaries were first introduced at iCLEF 2001 as a translation strategy which permitted faster document selection with roughly the same accur...
Fernando López-Ostenero, Julio Gonzalo, Fel...
OHS
2001
Springer
15 years 4 months ago
Link Augmentation: A Context-Based Approach to Support Adaptive Hypermedia
In today’s adaptive hypermedia systems, adaptivity is provided based on accumulative data gained from observing the user. User modelling, the capturing of information about the ...
Christopher Bailey, Samhaa R. El-Beltagy, Wendy Ha...
HICSS
2000
IEEE
121views Biometrics» more  HICSS 2000»
15 years 4 months ago
Combining Data from Existing Company Data Sources: Architecture and Experiences
Combining and utilizing data from different sources is a common problem in many companies today. Useful data can be found in various applications, such as spreadsheets, project ma...
Jari Vanhanen, Kai Risku, Pekka Kilponen