Sciweavers

339 search results - page 57 / 68
» Interorganizational Governance of Information Technology
Sort
View
WWW
2010
ACM
15 years 4 months ago
New-web search with microblog annotations
Web search engines discover indexable documents by recursively ‘crawling’ from a seed URL. Their rankings take into account link popularity. While this works well, it introduc...
Tom Rowlands, David Hawking, Ramesh Sankaranarayan...
CIKM
2010
Springer
14 years 7 months ago
Mining topic-level influence in heterogeneous networks
Influence is a complex and subtle force that governs the dynamics of social networks as well as the behaviors of involved users. Understanding influence can benefit various applic...
Lu Liu, Jie Tang, Jiawei Han, Meng Jiang, Shiqiang...
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
15 years 4 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
ICISS
2005
Springer
15 years 3 months ago
Event Detection in Multilevel Secure Active Databases
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
Indrakshi Ray, Wei Huang
BMCBI
2006
109views more  BMCBI 2006»
14 years 9 months ago
iHOPerator: user-scripting a personalized bioinformatics Web, starting with the iHOP website
Background: User-scripts are programs stored in Web browsers that can manipulate the content of websites prior to display in the browser. They provide a novel mechanism by which u...
Benjamin M. Good, Edward A. Kawas, Byron Yu-Lin Ku...