Sciweavers

170 search results - page 33 / 34
» A Practical Attack to De-anonymize Social Network Users
Sort
View
CAI
2011
Springer
13 years 8 days ago
Email Analysis and Information Extraction for Enterprise Benefit
In spite of rapid advances in multimedia and interactive technologies, enterprise users prefer to battle with email spam and overload rather than lose the benefits of communicatin...
Michal Laclavik, Stefan Dlugolinsky, Martin Seleng...
CHI
2010
ACM
14 years 3 days ago
Where there's a will there's a way: mobile media sharing in urban india
We present the results of a qualitative study of the sharing and consumption of entertainment media on low-cost mobile phones in urban India, a practice which has evolved into a v...
Thomas N. Smyth, Satish Kumar, Indrani Medhi, Kent...
DFN
2003
13 years 6 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
JAMIA
2011
83views more  JAMIA 2011»
12 years 8 months ago
Use of electronic clinical documentation: time spent and team interactions
Objective To measure the time spent authoring and viewing documentation and to study patterns of usage in healthcare practice. Design Audit logs for an electronic health record we...
George Hripcsak, David K. Vawdrey, Matthew R. Fred...
CORR
2007
Springer
146views Education» more  CORR 2007»
13 years 5 months ago
The Long Term Fate of Our Digital Belongings: Toward a Service Model for Personal Archives
We conducted a preliminary field study to understand the current state of personal digital archiving in practice. Our aim is to design a service for the long-term storage, preserv...
Catherine C. Marshall, Sara A. Bly, Francoise Brun...