Sciweavers

1663 search results - page 277 / 333
» Privacy and Identity Management
Sort
View
SOCA
2007
IEEE
15 years 6 months ago
Mobile Agent and Web Service Integration Security Architecture
Mobile agent technology and Web Service technology compensate each other and play very important roles in eservice applications. The mechanism of Web Services technology naturally...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
CEAS
2007
Springer
15 years 6 months ago
Email Communities of Interest
Email has become an integral and sometimes overwhelming part of users’ personal and professional lives. In this paper, we measure the flow and frequency of user email toward th...
Lisa Johansen, Michael Rowell, Kevin R. B. Butler,...
CONTEXT
2007
Springer
15 years 6 months ago
Thai Text Coherence Structuring with Coordinating and Subordinating Relations for Text Summarization
Text summarization with the consideration of coherence can be achieved by using discourse processing with the Rhetorical Structure Theory (RST). Additional problems on relational a...
Thana Sukvaree, Asanee Kawtrakul, Jean Caelen
PERSUASIVE
2007
Springer
15 years 6 months ago
Fine Tuning the Persuasion in Persuasive Games
Persuasive games are a relatively new phenomenon, and hold promise as effective vehicles for persuasion. As yet, however, there are few set rules guiding how to design persuasive ...
Rilla Khaled, Pippin Barr, James Noble, Ronald Fis...
ESCIENCE
2006
IEEE
15 years 6 months ago
A Synchronous Multimedia Annotation System for Secure Collaboratories
In this paper, we describe the Vannotea system - an application designed to enable collaborating groups to discuss and annotate collections of high quality images, video, audio or...
Ronald Schroeter, Jane Hunter, Jonathon Guerin, Im...