Sciweavers

3544 search results - page 500 / 709
» Information Security in Open Systems
Sort
View
ISI
2005
Springer
15 years 5 months ago
Discovering Identity Problems: A Case Study
Identity resolution is central to fighting against crime and terrorist activities in various ways. Current information systems and technologies deployed in law enforcement agencies...
Alan Gang Wang, Homa Atabakhsh, Tim Petersen, Hsin...
AC
2004
Springer
14 years 11 months ago
Cognitive Hacking
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
George Cybenko, Annarita Giani, Paul Thompson
ESAW
2007
Springer
15 years 5 months ago
Arguing about Reputation: The LRep Language
In the field of multiagent systems (MAS), the computational models of trust and reputation have attracted increasing interest since electronic and open environments became a reali...
Isaac Pinyol, Jordi Sabater-Mir
CIKM
2009
Springer
15 years 2 months ago
A framework for semantic link discovery over relational data
Discovering links between different data items in a single data source or across different data sources is a challenging problem faced by many information systems today. In partic...
Oktie Hassanzadeh, Anastasios Kementsietsidis, Lip...
79
Voted
ICSM
2009
IEEE
15 years 6 months ago
On the use of relevance feedback in IR-based concept location
Concept location is a critical activity during software evolution as it produces the location where a change is to start in response to a modification request, such as, a bug repo...
Gregory Gay, Sonia Haiduc, Andrian Marcus, Tim Men...