Search results for "Web"

showing 10 items of 2018 documents

Graphical information models as interfaces for Web document repositories

2000

In interorganisational processes, documents are used to record information created during the processes. Legislative processes involving several legislative organisations, or manufacturing processes involving complicated networks of companies and officials are examples of such processes. In the contemporary computerised environments a great deal of the recorded information is scattered in different kinds of Web repositories with different kinds of interfaces. The repositories should serve as valuable knowledge assets but their use may be difficult and even the knowledge about the kinds of repositories available may be insufficient. The paper presents a method for improving information manag…

Information managementbusiness.industrycomputer.internet_protocolComputer scienceWorld Wide WebMetadataInformation modelEuropean commissionGraphical modelTelematicsbusinessWeb documentcomputerXMLProceedings of the working conference on Advanced visual interfaces
researchProduct

Distributed Coverage of Ego Networks in F2F Online Social Networks

2016

Although most online social networks rely on a centralized infrastructure, several proposals of Distributed Online Social Networks (DOSNs) have been recently presented. Since in DOSNs user profiles are stored on the peers of the users belonging to the network, one of the main challenges comes from guaranteeing the profile availability when the owner of the data is not online. In this paper, we propose a DOSN based on a friend-to-friend P2P overlay where the user's data is stored only on friend peers. Our approach is based on the ego-network concept, which models the social network from the local point of view of a single user. We propose a distributed algorithm which is based on the notion …

Information privacyComputer scienceCryptography02 engineering and technologyWorld Wide WebSet (abstract data type)Artificial IntelligenceDistributed online social networksDominating setServer0202 electrical engineering electronic engineering information engineering1707P2PSettore INF/01 - InformaticaSocial networkDistributed databasebusiness.industryFriend-to-friend networkComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsData AvailabilityDistributed Online Social NetworkDistributed Online Social Networks; P2P; Data Availability; friend-to-friend networksComputer Networks and CommunicationPrivacyDistributed algorithm020201 artificial intelligence & image processingfriend-to-friend networksbusinessComputer network2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)
researchProduct

Technical Briefing: Hands-On Session on the Development of Trustworthy AI Software

2021

Following various real-world incidents involving both purely digital and cyber-physical Artificial Intelligence (AI) systems, AI Ethics has become a prominent topic of discussion in both research and practice, accompanied by various calls for trustworthy AI systems. Failures are often costly, and many of them stem from issues that could have been avoided during development. For example, AI ethics issues, such as data privacy are currently highly topical. However, implementing AI ethics in practice remains a challenge for organizations. Various guidelines have been published to aid companies in doing so, but these have not seen widespread adoption and may feel impractical. In this technical …

Information privacyComputer sciencebusiness.industryCyber-physical systemTrusted ComputingSoftware maintenanceSoftware prototypingGeneralLiterature_MISCELLANEOUSSession (web analytics)Engineering managementComputingMethodologies_PATTERNRECOGNITIONbusinessDesign methodsAgile software development2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)
researchProduct

To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications

2007

User's privacy concerns represent one of the most serious obstacles to the wide adoption of mobile social software applications. In this paper, we introduce a conceptual model which tackles the problem from the perspective of trade-off between privacy and trust, where the user takes the decision with minimal privacy loss. To support the user decision, we introduce the Mobile Access Control List (Macl), a privacy management mechanism which takes into account the user attitude towards mobile sharing, his communication history and social network relationships.

Information privacySocial networkPrivacy by Designbusiness.industryPrivacy softwareComputer scienceInternet privacySocial softwareMobile computingConceptual model (computer science)computer.software_genreWorld Wide WebbusinesscomputerAccess control list
researchProduct

DICOM E-mail: Germany's minimum standard for teleradiology

2005

Abstract Due to the lack of a standard for teleradiology, the IT Working Group (Arbeitsgemeinschaft fur Informationstechnik, @GIT) of the German Radiological Society (Deutsche Rontgengesellschaft, DRG) has set up an initiative for standardizing telemedicine. E-mail has been selected as the ideal basis for ad hoc connections in teleradiology since it is both easy to implement and use. The DICOM standard offers the option of appending DICOM data types as MIME attachments to any e-mail, thus enabling the transmission of the original DICOM data. Nevertheless, there are additional requirements (e.g., data privacy) that must be obeyed and implemented. The first recommendation was introduced at th…

Information privacyTelemedicinebusiness.industryComputer scienceGeneral MedicineTeleradiologylanguage.human_languageGermanWorld Wide WebDICOMlanguageThe InternetbusinessImplementationDicom StandardInternational Congress Series
researchProduct

Internet of things and privacy preserving technologies

2009

In this paper we consider different approaches to technological protection of users' privacy in the world of internet of things. Particularly, we consider what kind of problems and which level of protection can be achieved by applying approaches using secure multi-party computations.

Information privacyUbiquitous computingPrivacy by Designbusiness.industryComputer sciencePrivacy softwareInternet privacyData securityCryptographyComputer securitycomputer.software_genreWeb of ThingsThe Internetbusinesscomputer2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct

Privacy in Social Network Sites

2011

Are we running out of privacy? Nowadays, for example, we are concerned about whether the maintenance of a private sphere in online environments has become a luxury commodity (Papacharissi 2009). Questions of this kind are justified as online communication plays an increasingly important role in people’s everyday life (cf., e.g., Lundby 2009). While it seems exaggerated to stigmatize today’s youth as “communication junkies” (Patalong 2010), online conversations are increasingly becoming a functional equivalent to face to face communication (Beer 2008). However, some significant differences between online and “offline” communication remain. Face to face communication may remain largely intima…

Information privacyUser profileSocial networkbusiness.industryInternet privacySocial WelfarePrivate spherebusinessEveryday lifeSocial webFace-to-face interaction
researchProduct

Aggregation of the web performance of internal university units as a method of quantitative analysis of a university system: The case of Spain

2013

The aggregation of web performance (page count and visibility) of internal university units could constitute a more precise indicator than the overall web performance of the universities and, therefore, be of use in the design of university web rankings. In order to test this hypothesis, a longitudinal analysis of the internal units of the Spanish university system was conducted over the course of 2010. For the 13800 URLs identified, page count and visibility was calculated using the Yahoo API. The internal values obtained were aggregated by university and compared with the values obtained from the analysis of the university general URLs. The results indicate that, although the correlations…

Information retrievalComputer Networks and CommunicationsComputer scienceVisibility (geometry)Test (assessment)Human-Computer InteractionPage countQuantitative analysis (finance)Artificial IntelligenceWeb performanceLow correlationSoftwareUniversity systemInformation SystemsJournal of the American Society for Information Science and Technology
researchProduct

Schema-Based Visual Queries over Linked Data Endpoints

2019

We present the option to use the schema-based visual query tool ViziQuer over realistic Linked Data endpoints. We describe the tool meta-schema structure and the means for the endpoint schema retrieval both from an OWL ontology and from a SPARQL endpoint. We report on a store of the endpoint-specific schemas and the options to support the schema presentation to the end-user both as a class tree within the environment and as external visual diagram.

Information retrievalComputer science05 social sciencesDatabase schemaInformationSystems_DATABASEMANAGEMENTWeb Ontology LanguageLinked datacomputer.file_formatSchema (psychology)ComputingMethodologies_DOCUMENTANDTEXTPROCESSINGSPARQL0501 psychology and cognitive sciencesVisual queryRDFcomputer050107 human factors050104 developmental & child psychologycomputer.programming_language
researchProduct

Export of Relational Databases to RDF Databases: A Case Study

2010

The vast amount of business information nowadays is stored in relational databases. For the Semantic Web vision to become a reality, we need ways how to exploit this data in form of RDF triples. The universal and commonly accepted solution for this problem still does not exist. In most cases, mapping languages are used for specification of correspondences between OWL ontology and DB schema. At the same time, these languages generally are not well suited for specification of mappings in cases when there is a substantial difference between OWL ontology and DB schema. In this paper, we describe a new model transformation-based method for specification of correspondences between the elements of…

Information retrievalComputer scienceEntity–relationship modelDatabase schemaSPARQLWeb Ontology LanguageSemi-structured datacomputer.file_formatRDFcomputerInformation schemacomputer.programming_languageDatabase model
researchProduct