Sciweavers

1592 search results - page 51 / 319
» The state of the email address
Sort
View
CEAS
2005
Springer
14 years 2 months ago
SMTP Path Analysis
Most proponents of domain authentication suggest combining domain authentication with reputation services. This paper presents a new learning algorithm for learning the reputation...
Barry Leiba, Joel Ossher, V. T. Rajan, Richard Seg...
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
14 years 2 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
CIKM
2006
Springer
14 years 26 days ago
Continuous keyword search on multiple text streams
In this paper we address the issue of continuous keyword queries on multiple textual streams. This line of work represents a significant departure from previous keyword search mod...
Vagelis Hristidis, Oscar Valdivia, Michail Vlachos...
ECIS
2003
13 years 10 months ago
To denominate and characterise in the context of information systems
The aim of the paper is to discuss the distinction between characterisation (classification) and denomination (naming, identifying) in the context of information systems (IS). The...
Owen Eriksson
AAAI
1994
13 years 10 months ago
An Experiment in the Design of Software Agents
We describe a bottom-up approach to the design of software agents. We built and tested an agent system that addresses the real-world problem of handling the activities involved in...
Henry A. Kautz, Bart Selman, Michael H. Coen, Stev...