Sciweavers

4923 search results - page 966 / 985
» Software Risk Management
Sort
View
ATAL
2006
Springer
14 years 11 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate
113
Voted
CIKM
2006
Springer
14 years 11 months ago
Voting for candidates: adapting data fusion techniques for an expert search task
In an expert search task, the users' need is to identify people who have relevant expertise to a topic of interest. An expert search system predicts and ranks the expertise o...
Craig Macdonald, Iadh Ounis
ACMICEC
2008
ACM
240views ECommerce» more  ACMICEC 2008»
14 years 11 months ago
Document-oriented heterogeneous business process integration through collaborative e-marketplace
In this paper, we studied the semantic consistency maintenance issue between heterogeneous contexts, that is, how a firm business process of one e-marketplace can be transformed t...
Jingzhi Guo, Zhuo Hu, Chi-Kit Chan, Yufeng Luo, Ch...
CLEF
2008
Springer
14 years 11 months ago
GeoCLEF 2008: The CLEF 2008 Cross-Language Geographic Information Retrieval Track Overview
GeoCLEF is an evaluation initiative for testing queries with a geographic specification in large set of text documents. GeoCLEF ran a regular track for the third time within the C...
Thomas Mandl, Paula Carvalho, Giorgio Maria Di Nun...
BPSC
2007
171views Business» more  BPSC 2007»
14 years 11 months ago
XML Databases: Principles and Usage
Originally XML was used as a standard protocol for data exchange in computing. The evolution of information technology has opened up new situations in which XML can be used to aut...
Jaroslav Pokorný