Sciweavers

3984 search results - page 439 / 797
» Using linked data for systems management
Sort
View
146
Voted
ACSAC
2007
IEEE
15 years 10 months ago
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo...
149
Voted
JIPS
2010
138views more  JIPS 2010»
14 years 10 months ago
A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking Sy
In order to provide a tailored education for learners within the ubiquitous environment, it is critical to undertake an analysis of the learning activities of learners. For this pu...
Hyung-Min Lim, Kun-Won Jang, Byung-Gi Kim
120
Voted
SOUPS
2009
ACM
15 years 10 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
177
Voted
BMCBI
2010
153views more  BMCBI 2010»
15 years 3 months ago
MimoSA: a system for minimotif annotation
Background: Minimotifs are short peptide sequences within one protein, which are recognized by other proteins or molecules. While there are now several minimotif databases, they a...
Jay Vyas, Ronald J. Nowling, Thomas Meusburger, Da...
158
Voted
JCDL
2006
ACM
151views Education» more  JCDL 2006»
15 years 9 months ago
Tagging of name records for genealogical data browsing
In this paper we present a method of parsing unstructured textual records briefly describing a person and their direct relatives, which we use in the construction of a browsing t...
Mike Perrow, David Barber