Sciweavers

600 search results - page 109 / 120
» The Data Conversion Handbook
Sort
View
WPES
2003
ACM
14 years 19 days ago
Reusable anonymous return channels
Mix networks are used to deliver messages anonymously to recipients, but do not straightforwardly allow the recipient of an anonymous message to reply to its sender. Yet the abili...
Philippe Golle, Markus Jakobsson
ECAI
2000
Springer
13 years 11 months ago
Gaining Insights into Web Customers using Web Intelligence
The web is fast maturing into an important marketing medium that provides businesses with the ability to undertake oneto-one marketing and provide personalised services to their cu...
Sarabjot S. Anand, Matthias Baumgarten, Alex G. B&...
CHI
1996
ACM
13 years 11 months ago
Email Overload: Exploring Personal Information Management of Email
Email is one of the most successful computer applications yet devised. Our empirical data show however, that although email was originally designed as a communications application...
Steve Whittaker, Candace L. Sidner
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 11 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
ISPASS
2010
IEEE
13 years 9 months ago
Understanding transactional memory performance
Abstract—Transactional memory promises to generalize transactional programming to mainstream languages and data structures. The purported benefit of transactions is that they ar...
Donald E. Porter, Emmett Witchel