Sciweavers

1155 search results - page 16 / 231
» Trusting Data Quality in Cooperative Information Systems
Sort
View
BXML
2004
14 years 11 months ago
Trust and context using the RDF-Source related Storage System (RDF-S3) and easy RQL (eRQL)
Abstract. There exist different ways how to understand and use context information for RDF data. This paper summarizes these different ways and concentrates on the source informati...
Karsten Tolle, Fabian Wleklinski
AISADM
2005
Springer
15 years 3 months ago
A Cooperative Multi-agent Data Mining Model and Its Application to Medical Data on Diabetes
Abstract. We present CoLe, a model for cooperative agents for mining knowledge from heterogeneous data. CoLe allows for the cooperation of different mining agents and the combinat...
Jie Gao, Jörg Denzinger, Robert C. James
ECIS
2003
14 years 11 months ago
Meeting privacy obligations: the implications for information systems development
The European Union(EU) Data Protection (Privacy) Directive of 1995 (EUPD) and resulting legislation introduced by member states is designed to ensure that business activity is sub...
Reeva M. Lederman, Graeme G. Shanks, Martin R. Gib...
92
Voted
SRDS
2010
IEEE
14 years 7 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
79
Voted
ECSCW
1993
14 years 10 months ago
TOSCA Providing organisational information to CSCW applications
: Most cooperation support systems require information about the organisational context in which they are used. This is particularly required when systems are used in a large organ...
Wolfgang Prinz