Sciweavers

1155 search results - page 112 / 231
» Trusting Data Quality in Cooperative Information Systems
Sort
View
IEEEARES
2010
IEEE
15 years 7 months ago
LSM-Based Secure System Monitoring Using Kernel Protection Schemes
—Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In ...
Takamasa Isohara, Keisuke Takemori, Yutaka Miyake,...
IADIS
2009
14 years 11 months ago
Trash article detection using categorization techniques
We explore techniques for detecting news articles containing invalid information, using the help of text categorization technology. The information that exists on the World Wide W...
Christos Bouras, Vassilis Tsogkas, Vassilis Poulop...
COMAD
2008
15 years 3 months ago
Kshitij: A Search and Page Recommendation System for Wikipedia
Semantic information helps in identifying the context of a document. It will be interesting to find out how effectively this information can be used in recommending related docume...
Phanikumar Bhamidipati, Kamalakar Karlapalem
CHI
2011
ACM
14 years 5 months ago
Collaborative creativity: a complex systems model with distributed affect
The study of creativity has received significant attention over the past century, with a recent increase in interest in collaborative, distributed creativity. We posit that creati...
Cecilia R. Aragon, Alison Williams
108
Voted
ICC
2007
IEEE
15 years 8 months ago
A Support System for Designing Ubiquitous Service Composition Scenarios
—Ubiquitous service composition provides new services and applications seamlessly by establishing cooperation among any devices in home networks and any services in service provi...
Takaaki Moriya, Hiroyuki Ohnishi, Makoto Yoshida, ...