Sciweavers

937 search results - page 134 / 188
» Positive Active XML
Sort
View
ASUNAM
2009
IEEE
15 years 4 months ago
An Analytical Way to Find Influencers on Social Networks and Validate their Effects in Disseminating Social Games
As the weight of online social networks (OSNs) which provide powerful means of sharing common interests and communicating has gradually grown up, influencers are also given the gr...
Erica Suyeon Kim, Steve SangKi Han
SENSYS
2009
ACM
15 years 4 months ago
Suelo: human-assisted sensing for exploratory soil monitoring studies
Soil contains vast ecosystems that play a key role in the Earth’s water and nutrient cycles, but scientists cannot currently collect the high-resolution data required to fully u...
Nithya Ramanathan, Thomas Schoellhammer, Eddie Koh...
CCS
2009
ACM
15 years 4 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
BPM
2009
Springer
143views Business» more  BPM 2009»
15 years 4 months ago
Integrating Users in Object-Aware Process Management Systems: Issues and Challenges
Despite the increasing maturity of contemporary Workflow Management Systems (WfMS), there still exist numerous process-aware application systems with more or less hard-coded proce...
Vera Künzle, Manfred Reichert
WEBI
2009
Springer
15 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham