Conference paper
Social networks and discovery in the enterprise (SaND)
Inbal Ronen, Elad Shahar, et al.
SIGIR 2009
For many years, defence intelligence and government organizations have been using highly specialized security technologies to control access to sensitive information and to protect the integrity of information. In the face of increasing insider trading and industrial espionage, this paper describes how business can exploit technology that has previously been available only to spooks and is now available in open systems products.
Inbal Ronen, Elad Shahar, et al.
SIGIR 2009
Victor Valls, Panagiotis Promponas, et al.
IEEE Communications Magazine
Raymond Wu, Jie Lu
ITA Conference 2007
Alessandro Morari, Roberto Gioiosa, et al.
IPDPS 2011