Sciweavers

775 search results - page 128 / 155
» Email data cleaning
Sort
View
INTERACT
2003
15 years 1 months ago
Managing one's Social Network: Does Age Make a Difference?
: Keeping in touch with family and friends should be easier now that we have a repertoire of communication tools available to us (e.g. SMS, IM, email, mobile and landline phones). ...
Hilary Smith, Yvonne Rogers, Mark Brady
ICISC
1998
132views Cryptology» more  ICISC 1998»
15 years 1 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
LISA
2000
15 years 1 months ago
Peep (The Network Auralizer): Monitoring Your Network with Sound
Activities in complex networks are often both too important to ignore and too tedious to watch. We created a network monitoring system, Peep, that replaces visual monitoring with ...
Michael Gilfix, Alva L. Couch
ERCIMDL
2010
Springer
150views Education» more  ERCIMDL 2010»
15 years 28 days ago
A Search Log-Based Approach to Evaluation
Abstract. Anyone offering content in a digital library is naturally interested in assessing its performance: how well does my system meet the users' information needs? Standar...
Junte Zhang, Jaap Kamps
CSE
2009
IEEE
15 years 27 days ago
Social Relationship Identification: An Example of Social Query
Every moment, millions of people worldwide are communicating and sharing content online. We express ourselves online to enrich existing relationships and establish new relationship...
Christopher P. Diehl, Jaime Montemayor, Michael Pe...