Sciweavers

635 search results - page 59 / 127
» Social Aspects of Information Security
Sort
View
109
Voted
IJWIS
2007
153views more  IJWIS 2007»
14 years 11 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
CSE
2009
IEEE
15 years 6 months ago
How Did You Get to Know That? A Traceable Word-of-Mouth Algorithm
Word-of-mouth communication has been shown to play a key role in a variety of environments such as viral marketing and virus spreading. A family of algorithms, generally known as ...
Manuel Cebrián, Enrique Frías-Mart&i...
AOSE
2005
Springer
15 years 5 months ago
Requirements Elicitation for Agent-Based Applications
Requirements elicitation for a software system is a key stage in a successful development. At the same time, it is one of the most challenging, because requirements have to conside...
Rubén Fuentes, Jorge J. Gómez-Sanz, ...
CSCW
2000
ACM
15 years 4 months ago
Expertise recommender: a flexible recommendation system and architecture
Locating the expertise necessary to solve difficult problems is a nuanced social and collaborative problem. In organizations, some people assist others in locating expertise by ma...
David W. McDonald, Mark S. Ackerman
AAAI
2007
15 years 2 months ago
Analyzing Reading Behavior by Blog Mining
This paper presents a study of the various aspects of blog reading behavior. The analyzed data are obtained from a Japanese weblog hosting service, Doblog. Four kinds of social ne...
Tadanobu Furukawa, Mitsuru Ishizuka, Yutaka Matsuo...