Sciweavers

730 search results - page 124 / 146
» Modeling trust in collaborative information systems
Sort
View
165
Voted
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 6 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
130
Voted
EDCC
1994
Springer
15 years 7 months ago
Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach
Security and reliability issues in distributed systems have been investigated for several years at LAAS using a technique called Fragmentation-Redundancy-Scattering (FRS). The aim ...
Jean-Charles Fabre, Yves Deswarte, Brian Randell
141
Voted
CSCW
2000
ACM
15 years 3 months ago
Tailoring Groupware: The Cooperative Hypermedia Approach
Tailoring groupware has to deal with adapting properties of a shared information space as well as with adapting properties of the cooperation support to the group's needs. In...
Weigang Wang, Jörg M. Haake
144
Voted
IRI
2005
IEEE
15 years 9 months ago
Data integration for capital projects via community-specific conceptual representations
Although data integration has been a research subject for decades in the AEC (Architecture Engineering Construction) industry whose data is usually highly fragmented, nowadays we ...
Yimin Zhu, Mei-Ling Shyu, Shu-Ching Chen
125
Voted
IJEIS
2010
80views more  IJEIS 2010»
15 years 26 days ago
Semantics for Accurate Conflict Detection in SMoVer: Specification, Detection and Presentation by Example
In collaborative software development the utilization of Version Control Systems (VCSs) is a must. For this, a multitude of pessimistic as well as optimistic VCSs for model artifa...
Kerstin Altmanninger, Wieland Schwinger, Gabriele ...