Sciweavers

436 search results - page 75 / 88
» Arguing for gaining access to information
Sort
View
JCS
2010
135views more  JCS 2010»
14 years 10 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
HT
2010
ACM
15 years 4 months ago
The impact of resource title on tags in collaborative tagging systems
Collaborative tagging systems are popular tools for organization, sharing and retrieval of web resources. Their success is due to their freedom and simplicity of use. To post a re...
Marek Lipczak, Evangelos E. Milios
BMCBI
2005
134views more  BMCBI 2005»
14 years 11 months ago
Inherited disorder phenotypes: controlled annotation and statistical analysis for knowledge mining from gene lists
Background: Analysis of inherited diseases and their associated phenotypes is of great importance to gain knowledge of underlying genetic interactions and could ultimately give cl...
Marco Masseroli, Osvaldo Galati, Mauro Manzotti, K...
CCS
2001
ACM
15 years 4 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons
JSAC
2007
101views more  JSAC 2007»
14 years 11 months ago
CoopMAC: A Cooperative MAC for Wireless LANs
— Due to the broadcast nature of wireless signals, a wireless transmission intended for a particular destination station can be overheard by other neighboring stations. A focus o...
Pei Liu, Zhifeng Tao, Sathya Narayanan, Thanasis K...