Sciweavers

7921 search results - page 1091 / 1585
» Process Modeling in Web Applications
Sort
View
146
Voted
ICDE
2008
IEEE
200views Database» more  ICDE 2008»
15 years 10 months ago
Enforcing security in semantics driven policy based networks
— Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data b...
Palanivel Balaji Kodeswaran, Sethuram Balaji Kodes...
126
Voted
HICSS
2007
IEEE
164views Biometrics» more  HICSS 2007»
15 years 10 months ago
The Social Structure of Tagging Internet Video on del.icio.us
Abstract— The ability to tag resources with uncontrolled metadata or “folksonomies” is often characterized as one of the central features of “Web 2.0” applications. Folks...
John C. Paolillo, Shashikant Penumarthy
138
Voted
ICDCSW
2007
IEEE
15 years 9 months ago
Context to Make You More Aware
The goal of our work is to help users make more informed choices about what physical activities they undertake. One example is to provide relevant information to help someone choo...
Adrienne H. Andrew, Yaw Anokwa, Karl Koscher, Jona...
141
Voted
SOCA
2007
IEEE
15 years 9 months ago
A Service-oriented Architecture for Business Intelligence
Business intelligence is a business management term used to describe applications and technologies which are used to gather, provide access to and analyze data and information abo...
Liya Wu, Gilad Barash, Claudio Bartolini
112
Voted
AUSDM
2007
Springer
113views Data Mining» more  AUSDM 2007»
15 years 9 months ago
PCITMiner- Prefix-based Closed Induced Tree Miner for finding closed induced frequent subtrees
Frequent subtree mining has attracted a great deal of interest among the researchers due to its application in a wide variety of domains. Some of the domains include bio informati...
Sangeetha Kutty, Richi Nayak, Yuefeng Li
« Prev « First page 1091 / 1585 Last » Next »