1 - 7 of 7 articles
The Web's link structure (termed the Web Graph) is a richly connected set of Web pages. Current applications use this graph for indexing and information retrieval purposes. In contrast the relationship between Web Graph and application is reversed by letting the structure of the Web Graph...
It is well‐known that the primary threat against misuse of private data about individuals is present within the organisation; proposes a system that uses intrusion detection system (IDS) technologies to help safeguard such private information. Current IDSs attempt to detect intrusions on a low...
Presents a new model for resource discovery in grids and peer‐to‐peer networks designed to utilise efficiently small numbers of messages for query processing and building of the network. Outlines and evaluates the model through a theoretical comparison with other resource discovery systems and a...
Distributed computing architecture has been around for a while, but not all of its benefits could be leveraged due to issues such as inter‐operability, industry standards and cost efficiency that could provide agility and transparency to the business process integration. Web services offer a...
The Grid is widely seen as the next generation Internet. Aims to share dynamic collections of individuals, institutions and resources by providing consistent, easy and inexpensive access to high‐end computational capabilities. Studies Grid security and specifically users' access control. It has...
During the dot com era the word “personalisation” was a hot buzzword. With the fall of the dot com companies the topic has lost momentum. As the killer application for UMTS has yet to be identified, the concept of multi‐dimensional‐personalisation (MDP) could be a candidate. Using this approach,...
This paper is an outline of findings from a research project investigating the non‐business use of the World Wide Web in organisations. The study uncovered high non‐business usage in the selected organisations. Pornography and other traditionally identified risks were found to be largely...
Read and print from thousands of top scholarly journals.
Continue with Facebook
Sign up with Google
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.