97,113 Hits in 5.1 sec

A Roadmap Towards Distributed Web Assessment [chapter]

Arno Scharl
2004 Lecture Notes in Computer Science  
It mirrors more than 5,000 international Web sites in monthly intervals and has amassed Web data in excess of one terabyte since 1999.  ...  The webLyzard project generates empirical Web data by processing large samples of Web sites automatically.  ...  The use of open standards for encoding both structural and textual site data will enable other disciplines and stakeholders to effectively leverage the gathered information, which will be available via  ... 
doi:10.1007/978-3-540-27834-4_22 fatcat:aysgavqwefayxiwexg5ipnl3ye

Towards grid based intelligent information systems

A.M. Tjoa, P. Brezany, I. Janciak
2003 2003 International Conference on Parallel Processing, 2003. Proceedings.  
Multi agent systems, Grid technology, Semantic Web, and Web Intelligence paradigm are three modern approaches in information technologies, which we put together in our research effort described in this  ...  The full version of the paper will also describe the Wisdom Grid functionality by means of a case study of one medical application.  ...  This service is a part of the Wisdom Grid system and plays the main role in the interaction of agent and Grid services, and as such, it is the mediator between the Agent platform and other services on  ... 
doi:10.1109/icpp.2003.1240616 dblp:conf/icpp/TjoaBJ03 fatcat:7pbfwxwf2ncyrinbpehhcpe65y

The Social Embeddedness of Transactions: Evidence from the Residential Real-Estate Industry

Steve Sawyer, Kevin Crowston, Rolf T. Wigand, Marcel Allbritton
2003 The Information Society  
Drawing on data from a regional study of the residential real-estate industry in the United States, we focus on the disintermediation or, more accurately, the re-intermediation of real estate agents in  ...  From this analysis we develop a set of generic market coordination structures to profile the role of the agent in the real estate transaction process.  ...  of the roles of ICT use in reshaping information-intensive work practices.  ... 
doi:10.1080/01972240309460 fatcat:levs4qwm5nevvbwu62u4lgnxna

The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferences

Lorrie Faith Cranor
2002 Proceedings of the 12th annual conference on Computers, freedom and privacy - CFP '02  
The Platform for Privacy Preferences (P3P) project [1] provides a standard way for web sites to communicate about their data practices.  ...  Developed by the World Wide Web Consortium (W3C) [2], P3P includes a machine-readable privacy policy syntax as well as a simple protocol that web browsers and other user agent tools can use to fetch P3P  ...  The opinion also raised concerns about how defaults would be set in P3P user agents as well as whether these agents might transfer data to web sites without user consent.  ... 
doi:10.1145/543482.543506 fatcat:egzrvhwiqbfc5khlqjnve2j3cy

An Agent-Based Approach to Web Site Maintenance [chapter]

Wamberto W. Vasconcelos, João Cavalcanti
2004 Lecture Notes in Computer Science  
In this paper we explain one such approach, using software agents to look after large data-intensive Web sites.  ...  Web sites are public representations of corporations, businesses and governmental bodies.  ...  of looking after a large data-intensive Web site, managing static Web pages.  ... 
doi:10.1007/978-3-540-27834-4_35 fatcat:w45kyirelna6xkkjaiatdhh5fm

An affiliated search system for an electronic commerce and software component architecture

Incheon Paik, Tongwon Han, Dongik Oh, Sangho Ha, Donggue Park
2003 Information and Software Technology  
The software component architecture for ECGSS also allows the effective deployment of the system on every local business site, in view of the evolving trend in information technology toward easier configuration  ...  In this affiliated business transaction model, we classify Internet sites into two groups: a cooperative sites group, and a non-cooperative sites group.  ...  Acknowledgements This work was supported by the Supporting Program for University Software Research Center under the Ministry of Information and Communication, Korea.  ... 
doi:10.1016/s0950-5849(03)00028-4 fatcat:skqlye2vjrg7fhl5zfirdfabmi

The web from a complex adaptive systems perspective

Maya Rupert, Amjad Rattrout, Salima Hassas
2008 Journal of computer and system sciences (Print)  
We propose a model and a prototype of a system that addresses the dynamic web content organization, adopting the CAS vision and using the multi-agent paradigm.  ...  Integrating mechanisms of self-organization of the web content is an attractive perspective, to match with these requirements.  ...  Positions of the agents in the spatial organization are influenced by the roles the agents play in different groups and vice versa; roles and groups emerge in the social organization and are identified  ... 
doi:10.1016/j.jcss.2007.04.001 fatcat:3go65etm25gabior4d5v3ycuoi

Investigating the interplay between structure and information and communications technology in the real estate industry

Kevin Crowston, Steve Sawyer, Rolf Wigand
2001 Information Technology and People  
Data reveal historical structures of this industry guiding the day-to-day work of agents, buyers and sellers.  ...  Many of these structures are embodied in a set of explicit contracts that reify existing structures and legitimize realtors' actions.  ...  , web-based data and to field work sites.  ... 
doi:10.1108/09593840110695749 fatcat:4dk7p6n235czdprzcscv27atta

Informing the Curious Negotiator: Automatic News Extraction from the Internet [chapter]

Debbie Zhang, Simeon J. Simoff
2006 Lecture Notes in Computer Science  
The technique is based on identifying regularities in both format and content of the news web sites. The algorithms are applicable to both single-and multi-document web sites.  ...  We then present one of its components in more details -an effective automated technique for extracting relevant articles from news web sites, so that they can be used further by the mining agents.  ...  Many web sites use templates to automatical1y generate pages and fill them with results of a database query, in particular, for news web sites.  ... 
doi:10.1007/11677437_14 fatcat:mupi2fkh6rh57ptxgiukqcre4m

Designing data-intensive web applications for content accessibility using web marts

Stefano Ceri, Maristella Matera, Francesca Rizzo, Vera Demaldé
2007 Communications of the ACM  
the role of the unit in the Web Mart.  ...  While in Data Marts all dimensions have an equivalent role, in a Web Mart access entities and detail entities have distinct roles.  ... 
doi:10.1145/1232743.1232748 fatcat:llxefegssvdnja2yqm6mzzcfwi

Security models for web-based applications

James B. D. Joshi, Walid G. Aref, Arif Ghafoor, Eugene H. Spafford
2001 Communications of the ACM  
daunting challenge of ensuring the security and privacy of information in such Web-based applications [4] .  ...  As no access authorization services are provided in this approach, it has a rather limited scope for Web-based applications.  ...  Many sites also use push technology to deliver Web content to clients.  ... 
doi:10.1145/359205.359224 fatcat:vsa4ca3kabfvzeve6zp7kkg2ze

Intelligent wireless web services: context-aware computing in construction-logistics supply chain

Balqis Omar, Tabarak Ballal
2009 Journal of Information Technology in Construction  
and RFID, selection of supporting technologies such as wireless communication, Semantic Web, Web Services, agents, etc.  ...  The major problems in these applications are lack of context-specificity in the distribution of information, services and other project resources, and lack of cohesion with the existing desktop based ICT  ...  ACKNOWLEDGEMENT This research has been funded by Universiti Teknologi Malaysia and the Ministry of Higher Education of Malaysia.  ... 
dblp:journals/itcon/OmarB09 fatcat:xxrevtqclbaffaq42y2suplo3q

aZIMAS: Web Mobile Agent System [chapter]

Subramanian Arumugam, Abdelsalam Sumi Helal, Amar Nalla
2002 Lecture Notes in Computer Science  
By its nature the spider agent is a data-intensive application.  ...  The agent paradigm has potential use in three application domains: 1. Information processing. Data-intensive applications where the data is remotely located can be structured using agents.  ...  APPENDIX B SERVLET-BASED APPROACH In aZIMAS, the Agent Environment (AE) is glued to the web server through means of a server module.  ... 
doi:10.1007/3-540-36112-x_1 fatcat:fvgkonb3yvco3craqp2gtsmnqi

The frontlines of medicine project: A proposal for the standardized communication of emergency department data for public health uses including syndromic surveillance for biological and chemical terrorism

Edward N. Barthell, William H. Cordell, John C. Moorhead, Jonathan Handler, Craig Feied, Mark S. Smith, Dennis G. Cochrane, Christopher W. Felton, Michael A. Collins, Kim R. Pemble, Brian K. Keaton
2003 Journal of urban health  
A Web-mounted "dashboard" facilitated comparison of syndrome rates and other surveillance trends. The Web site facilitated collection, analysis, and display of surveillance information.  ...  Public health information alerts may have played a role in decreasing exposure and avoiding increased HCU.  ...  A Web-mounted "dashboard" facilitated comparison of syndrome rates and other surveillance trends. The Web site facilitated collection, analysis, and display of surveillance information.  ... 
doi:10.1007/bf02416915 fatcat:7372ubit6jcvpi7gzrlss4re6e

A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper] [chapter]

Gunmeet Singh, Sarbjeet Singh
2009 Lecture Notes in Computer Science  
In case of a violation the third party, informs the users of the breach. The implementation of the proactive check on the PII has been done through software agents.  ...  In this paper we studied the various privacy mechanisms in place and compared them on the basis of their architecture and third party intervention.  ...  Disadvantages of the Proposed Privacy Policy 1. Complex technologies involved for example Software Agents . 2. Uses Data Intensive auditing to enforce PII's integrity.  ... 
doi:10.1007/978-3-642-11145-7_27 fatcat:3koj42lbmzdaplzgggy7fw6y74
« Previous Showing results 1 — 15 out of 97,113 results