Sciweavers

1617 search results - page 280 / 324
» Recommender Systems
Sort
View
141
Voted
SIGUCCS
2004
ACM
15 years 9 months ago
Spam software evaluation, training, and support: fighting back to reclaim the email inbox
This paper explains two projects dealing with spam recently completed at Iowa State University (ISU). The first project was undertaken by a team composed of members of the campus ...
Jeff Balvanz, Don Paulsen, Joe Struss
SWS
2004
ACM
15 years 9 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
ITRUST
2004
Springer
15 years 9 months ago
Towards Dynamic Security Perimeters for Virtual Collaborative Networks
Abstract The Internet provides a ubiquitous, standards-based substrate for global communications of all kinds. Rapid advances are now being made in agreeing protocols and machine-p...
Ivan Djordjevic, Theodosis Dimitrakos
IPPS
2003
IEEE
15 years 9 months ago
Performance of Distributed Algorithms for Topology Control in Wireless Networks
We try to close the gap between theoretical investigations of wireless network topologies and realistic wireless environments. For point-to-point communication, we examine theoret...
Stefan Rührup, Christian Schindelhauer, Klaus...
127
Voted
ICCS
2003
Springer
15 years 9 months ago
TCM-Grid: Weaving a Medical Grid for Traditional Chinese Medicine
We present a TCM-Grid for Traditional Chinese Medicine (TCM). The purpose of the TCM-Grid is to aid the development of distributed systems that help health professionals, researche...
Huajun Chen, Zhaohui Wu, Chang Huang, Jiefeng Xu