Sciweavers

1545 search results - page 49 / 309
» Information Systems Success Revisited
Sort
View
TKDE
2008
111views more  TKDE 2008»
14 years 9 months ago
Efficient Remote Data Possession Checking in Critical Information Infrastructures
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, and so forth)...
Francesc Sebé, Josep Domingo-Ferrer, Antoni...
CSE
2009
IEEE
15 years 4 months ago
A Visual Interface for Social Information Filtering
Abstract—Collaborative or “Social” filtering has been successfully deployed over the years as a technique for analysing large amounts of user-preference knowledge to predict...
John O'Donovan, Brynjar Gretarsson, Svetlin Bostan...
ICCBR
2005
Springer
15 years 3 months ago
Re-using Implicit Knowledge in Short-Term Information Profiles for Context-Sensitive Tasks
Typically, case-based recommender systems recommend single items to the on-line customer. In this paper we introduce the idea of recommending a user-defined collection of items whe...
Conor Hayes, Paolo Avesani, Emiliano Baldo, Padrai...
ICEIS
2002
IEEE
15 years 2 months ago
Mediated Communication in Groupware Systems
: In the creation of groupware systems, a good design of communication mechanisms, required by the group in order to carry out its work, is essential, since there are many other de...
Luis A. Guerrero, Sergio F. Ochoa, Oriel A. Herrer...
ICEIS
1999
IEEE
15 years 2 months ago
A Method for Integrating Legacy Systems within Distributed Object Architecture
: The ability of a new technology to reuse legacy systems is very important for its economic success. This paper presents a method for integrating legacy systems within distributed...
Matjaz B. Juric, Ivan Rozman, Marjan Hericko