Sciweavers

241 search results - page 29 / 49
» Recommendation to Groups
Sort
View
GRID
2005
Springer
15 years 5 months ago
Web services and grid security vulnerabilities and threats analysis and model
The paper provides an overview of available web applications and Web Services security vulnerability models and proposes a classification of the potential Grid and Web Services at...
Yuri Demchenko, Leon Gommans, Cees T. A. M. de Laa...
OTM
2005
Springer
15 years 5 months ago
JXTA Messaging: Analysis of Feature-Performance Tradeoffs and Implications for System Design
Abstract. With the rise of Peer-to-Peer and Grid infrastructures, there is a renewed interest in messaging systems. Among the numerous messaging solutions for large loosely coupled...
Emir Halepovic, Ralph Deters, Bernard Traversat
CSCW
2004
ACM
15 years 5 months ago
Blogging as social activity, or, would you let 900 million people read your diary?
"Blogging" is a Web-based form of communication that is rapidly becoming mainstream. In this paper, we report the results of an ethnographic study of blogging, focusing ...
Bonnie A. Nardi, Diane J. Schiano, Michelle Gumbre...
KDD
2004
ACM
173views Data Mining» more  KDD 2004»
15 years 5 months ago
Collaborative Quality Filtering: Establishing Consensus or Recovering Ground Truth?
We present a algorithm based on factor analysis for performing collaborative quality filtering (CQF). Unlike previous approaches to CQF, which estimate the consensus opinion of a...
Jonathan Traupman, Robert Wilensky
DEXAW
2003
IEEE
110views Database» more  DEXAW 2003»
15 years 5 months ago
Methodology and Tools to Support Storytelling in Cultural Heritage Forums
Storytelling is a method by which members of a community communicate, learn and build identity. In the CIPHER project we aim to provide customisable tools for the sharing of stori...
Trevor D. Collins, Paul Mulholland, David Bradbury...