Sciweavers

1173 search results - page 136 / 235
» Identifying Successful Telecommuters
Sort
View
WECWIS
2006
IEEE
139views ECommerce» more  WECWIS 2006»
15 years 11 months ago
WSC-06: The Web Service Challenge
In today’s businesses, there is a trend that serviceoriented architecture (SOA) is evolving into a popular architectural paradigm for IT infrastructure. SOA allows companies’ ...
M. Brian Blake, William Kwok-Wai Cheung, Michael C...
DOCENG
2006
ACM
15 years 11 months ago
Evaluating invariances in document layout functions
With the development of variable-data-driven digital presses where each document printed is potentially unique there is a need for pre-press optimization to identify material that...
Alexander J. Macdonald, David F. Brailsford, John ...
SIGIR
2006
ACM
15 years 11 months ago
Latent semantic analysis for multiple-type interrelated data objects
Co-occurrence data is quite common in many real applications. Latent Semantic Analysis (LSA) has been successfully used to identify semantic relations in such data. However, LSA c...
Xuanhui Wang, Jian-Tao Sun, Zheng Chen, ChengXiang...
SOUPS
2006
ACM
15 years 11 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
COLCOM
2005
IEEE
15 years 11 months ago
An experimental evaluation of spam filter performance and robustness against attack
— In this paper, we show experimentally that learning filters are able to classify large corpora of spam and legitimate email messages with a high degree of accuracy. The corpor...
Steve Webb, Subramanyam Chitti, Calton Pu