Sciweavers

775 search results - page 128 / 155
» Email data cleaning
Sort
View
INTERACT
2003
14 years 11 months ago
Managing one's Social Network: Does Age Make a Difference?
: Keeping in touch with family and friends should be easier now that we have a repertoire of communication tools available to us (e.g. SMS, IM, email, mobile and landline phones). ...
Hilary Smith, Yvonne Rogers, Mark Brady
ICISC
1998
132views Cryptology» more  ICISC 1998»
14 years 11 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
LISA
2000
14 years 11 months ago
Peep (The Network Auralizer): Monitoring Your Network with Sound
Activities in complex networks are often both too important to ignore and too tedious to watch. We created a network monitoring system, Peep, that replaces visual monitoring with ...
Michael Gilfix, Alva L. Couch
ERCIMDL
2010
Springer
150views Education» more  ERCIMDL 2010»
14 years 10 months ago
A Search Log-Based Approach to Evaluation
Abstract. Anyone offering content in a digital library is naturally interested in assessing its performance: how well does my system meet the users' information needs? Standar...
Junte Zhang, Jaap Kamps
65
Voted
CSE
2009
IEEE
14 years 10 months ago
Social Relationship Identification: An Example of Social Query
Every moment, millions of people worldwide are communicating and sharing content online. We express ourselves online to enrich existing relationships and establish new relationship...
Christopher P. Diehl, Jaime Montemayor, Michael Pe...