Sciweavers

2616 search results - page 153 / 524
» Knowledge Management
Sort
View
ICISS
2007
Springer
15 years 7 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
162
Voted
DLOG
2011
14 years 6 months ago
Reasoning in Resource-Constrained Environments: a Matchmaking Engine over Relational Knowledge Bases
We present a framework for logic-based matchmaking on ALN ABoxes stored in a relational database. The proposed approach allows both non-standard reasoning and subsumption check be ...
Eufemia Tinelli, Francesco M. Donini, Michele Ruta...
DGO
2003
295views Education» more  DGO 2003»
15 years 4 months ago
Technology Implementation Management in Law Enforcement: COPLINK System Usability and User Acceptance Evaluations
In this paper, we report on two user-centric evaluation studies of COPLINK, a suite of criminal data mining and knowledge management applications developed at the University of Ari...
Chienting Lin, Paul J. Hu, Hsinchun Chen, Jennifer...
ICALT
2006
IEEE
15 years 9 months ago
Social Software for Professional Learning: Examples and Research Issues
Social software is used widely in organizational knowledge management and professional learning. The PROLEARN network of excellence appreciates the trend of lowering the barriers ...
Ralf Klamma, Mohamed Amine Chatti, Erik Duval, Seb...
JNSM
1998
94views more  JNSM 1998»
15 years 3 months ago
Design and Implementation of TMN SMK System Using CORBA ORB
In Telecommunication Management Network (TMN), the interworking of manager and agent requires the sharing of management information defined as Shared Management Knowledge (SMK) in...
Jong-Tae Park, Su-Ho Ha, James Won-Ki Hong