Sciweavers

453 search results - page 86 / 91
» Visitor awareness in the web
Sort
View
ECRIME
2007
13 years 11 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
EUROPAR
2006
Springer
13 years 11 months ago
A One-Stop, Fire-and-(Almost)Forget, Dropping-Off and Rendezvous Point
In order to foster uptake by scientific and business users we need an easy way to access Grid resources. This is the motivation for the A-WARE project. We build upon a fabric layer...
Roger Menday, Björn Hagemeier, Bernd Schuller...
CLA
2004
13 years 9 months ago
Using Concept Formal Analysis for Cooperative Information Retrieval
cessary to abstract it and eliminate the redundancy data. In this context, a method for data reduction based on the formal concept analysis is proposed in [16,17]. At the same time...
Ibtissem Nafkha, Samir Elloumi, Ali Jaoua
ECEH
2006
101views Healthcare» more  ECEH 2006»
13 years 9 months ago
Towards European Patient Summaries based on Triple Space Computing
: Medical practice today still entails sorting through scattered information on a specific patient. Making things more difficult, the EU, in bringing its member states closer toget...
Dario Cerizza, Emanuele Della Valle, Doug Foxvog, ...
ECIS
2001
13 years 9 months ago
Make or Buy - A Taxonomy of Intranet Implementation Strategies
Most modern organizations have implemented intranets for communication within the organization itself. Recently drastic changes have occurred on the supply side of the technology ...
Jan Karlsbjerg, Jan Damsgaard