Instant Messaging (IM) is being widely adopted by teenagers. In a study of 16 teenage IM users, we explore IM as an emerging feature of teen life, focusing our questions on its su...
Web mail providers rely on users to “vote” to quickly and collaboratively identify spam messages. Unfortunately, spammers have begun to use bots to control large collections o...
Anirudh Ramachandran, Anirban Dasgupta, Nick Feams...
Personalization of information retrieval tailors search towards individual users to meet their particular information needs by taking into account information about users and thei...
Jingjing Liu, Michael J. Cole, Chang Liu, Ralf Bie...
With the lack of admission control and resource reservation mechanisms in the Internet, overload situations can only be avoided by having the end systems deploying congestion cont...
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...