Sciweavers

2454 search results - page 355 / 491
» Privacy in the Information and Communications Technologies
Sort
View
CIKM
2007
Springer
15 years 4 months ago
Using word similarity to eradicate junk emails
Emails are one of the most commonly used modern communication media these days; however, unsolicited emails obstruct this otherwise fast and convenient technology for information ...
Maria Soledad Pera, Yiu-Kai Ng
SECURWARE
2008
IEEE
15 years 4 months ago
A Dependability Case Approach to the Assessment of IP Networks
—IP networks, composing the Internet, form a central part of the information infrastructure of the modern society. Integrated approaches to the assessment of their dependability ...
Ilkka Norros, Pirkko Kuusela, Pekka Savola
BTW
2007
Springer
189views Database» more  BTW 2007»
15 years 4 months ago
Reconsidering Consistency Management in Shared Data Spaces for Emergency and Rescue Applications
: Efficient information sharing is very important for emergency and rescue operations. These operations often have to be performed in environments where no communication infrastruc...
Thomas Plagemann, Ellen Munthe-Kaas, Vera Goebel
CIKM
2007
Springer
15 years 4 months ago
Spam filtering for short messages
We consider the problem of content-based spam filtering for short text messages that arise in three contexts: mobile (SMS) communication, blog comments, and email summary informa...
Gordon V. Cormack, José María G&oacu...
SIGIR
2005
ACM
15 years 3 months ago
Self-organizing distributed collaborative filtering
We propose a fully decentralized collaborative filtering approach that is self-organizing and operates in a distributed way. The relevances between downloading files (items) are...
Jun Wang, Marcel J. T. Reinders, Reginald L. Lagen...