Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Collaboration to accomplish tasks has taken on a new meaning over the past few years. The majority of organizations are viewing information technology (IT) as a key enabler to tra...
Information retrieval systems can be partitioned into two main classes: large-scale systems that make use of an inverted index or some other auxiliary data structure, intended for...
Voicemail is a pervasive, but under-researched tool for workplace communication. Despite potential advantages of voicemail over email, current phone-based voicemail UIs are highly...
Steve Whittaker, Richard Davis, Julia Hirschberg, ...