Sciweavers

459 search results - page 30 / 92
» Designing for email response management
Sort
View
ECIS
2004
14 years 11 months ago
Ontology and business: creating structure for storing and accessing organisational knowledge on intranets
Storing organisational information on Intranets is fast becoming the norm for corporate information management, as is the provision of tools which assist locating, adding to and u...
Paul Jackson
WWW
2008
ACM
15 years 10 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
CIKM
2009
Springer
15 years 1 months ago
Ensembles in adversarial classification for spam
The standard method for combating spam, either in email or on the web, is to train a classifier on manually labeled instances. As the spammers change their tactics, the performanc...
Deepak Chinavle, Pranam Kolari, Tim Oates, Tim Fin...
CCR
2004
100views more  CCR 2004»
14 years 9 months ago
A real options framework to value network, protocol, and service architecture
This paper proposes a real options framework for evaluating architectural choices and the economic value of these alternative choices of networks, protocols, and services. Using p...
Mark Gaynor, Scott Bradner
SIGIR
2003
ACM
15 years 3 months ago
Stuff I've seen: a system for personal information retrieval and re-use
Most information retrieval technologies are designed to facilitate information discovery. However, much knowledge work involves finding and re-using previously seen information. W...
Susan T. Dumais, Edward Cutrell, Jonathan J. Cadiz...