Sciweavers

CHINZ
2007
ACM
15 years 9 months ago
Users dealing with spam and spam filters: some observations and recommendations
The email communication system is threatened by unsolicited commercial email aka spam. In response, spam filters have been deployed widely to help reduce the amount of spam users ...
Christopher Lueg, Sam Martin
CHINZ
2007
ACM
15 years 9 months ago
Evaluation of spatial abilities through tabletop AR
Research has been done into improving the means by which we organise and manage information. The usefulness of 2D versus 3D interfaces and environments has also been debated and e...
Moffat Mathews, Madan Challa, Cheng-Tse Chu, Gu Ji...
CEC
2009
IEEE
15 years 9 months ago
A conflict based SAW method for Constraint Satisfaction Problems
Evolutionary algorithms have employed the SAW (Stepwise Adaptation of Weights) method in order to solve CSPs (Constraint Satisfaction Problems). This method originated in hill-clim...
Rafi Shalom, Mireille Avigal, Ron Unger
CHIMIT
2007
ACM
15 years 9 months ago
Design guidelines for system administration tools developed through ethnographic field studies
Information Technology system administrators (sysadmins) perform the crucial and never-ending work of maintaining the technical infrastructure on which our society depends. Comput...
Eben M. Haber, John H. Bailey
CHIMIT
2007
ACM
15 years 9 months ago
Activity-based management of IT service delivery
Growth, adaptability, innovation, and cost control are leading concerns of businesses, especially with respect to use of information technology (IT). Though standards such as the ...
John H. Bailey, Eser Kandogan, Eben M. Haber, Paul...