Sciweavers

746 search results - page 148 / 150
» People search in the enterprise
Sort
View
JUCS
2008
166views more  JUCS 2008»
14 years 9 months ago
Exposure and Support of Latent Social Networks among Learning Object Repository Users
Abstract: Although immense efforts have been invested in the construction of hundreds of learning object repositories, the degree of reuse of learning resources maintained in such ...
Peng Han, Gerd Kortemeyer, Bernd J. Krämer, C...
EOR
2007
108views more  EOR 2007»
14 years 9 months ago
How much information do we need?
ct 7 Modern technology is succeeding in delivering more information to people at ever faster rates. Under traditional 8 views of rational decision making where individuals should e...
Peter M. Todd
97
Voted
JOC
2007
133views more  JOC 2007»
14 years 9 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
JUCS
2007
122views more  JUCS 2007»
14 years 9 months ago
Creating Links into the Future
: We are approaching an era where research materials will be stored more and more as digital resources on the World Wide Web. This of course will enable easier access to online pub...
Muhammad Tanvir Afzal, Narayanan Kulathuramaiyer, ...
87
Voted
COMPUTER
2000
180views more  COMPUTER 2000»
14 years 9 months ago
The Challenges of Automatic Summarization
tion--the art of abstracting key content from one or more information sources--has become an integral part of everyday life. People keep abreast of world affairs by listening to ne...
Udo Hahn, Inderjeet Mani