Sciweavers

2454 search results - page 400 / 491
» Privacy in the Information and Communications Technologies
Sort
View
HICSS
2003
IEEE
176views Biometrics» more  HICSS 2003»
15 years 3 months ago
Ad-Hoc Association-Rule Mining within the Data Warehouse
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...
Svetlozar Nestorov, Nenad Jukic
SEMWEB
2009
Springer
15 years 2 months ago
Semantic Web Service Composition in Social Environments
This paper describes how to generate compositions of semantic Web services using social trust information from user ratings of the services. We present a taxonomy of features, suc...
Ugur Kuter, Jennifer Golbeck
FAST
2004
14 years 11 months ago
Tracefs: A File System to Trace Them All
File system traces have been used for years to analyze user behavior and system software behavior, leading to advances in file system and storage technologies. Existing traces, ho...
Akshat Aranya, Charles P. Wright, Erez Zadok
LEGE
2003
107views Education» more  LEGE 2003»
14 years 11 months ago
Design Considerations for an ELeGI Portal
ELeGI, the European Learning Grid Infrastructure, has the ambitious goal of fostering effective learning and knowledge construction through the dynamic provision of service-based ...
Colin Allison, Rosa Michaelson
TISSEC
2010
237views more  TISSEC 2010»
14 years 4 months ago
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...