Sciweavers

451 search results - page 55 / 91
» What Is a Conversation Policy
Sort
View
WWW
2004
ACM
14 years 10 months ago
Filtering spam e-mail on a global scale
In this paper we analyze a very large junk e-mail corpus which was generated by a hundred thousand volunteer users of the Hotmail e-mail service. We describe how the corpus is bei...
Geoff Hulten, Joshua T. Goodman, Robert Rounthwait...
GLOBECOM
2009
IEEE
14 years 4 months ago
Fusion and Diversity Trade-Offs in Cooperative Estimation over Fading Channels
—In this paper we consider a network of distributed sensors that are trying to measure a parameter of interest cooperatively, by exchanging their acquired information repeatedly ...
Mehrzad Malmirchegini, Yasamin Mostofi
HICSS
2007
IEEE
102views Biometrics» more  HICSS 2007»
14 years 4 months ago
Social Facilitators and Inhibitors to Online Fluency
Studies of Internet use continue to show a gap between those with and without access to the Internet and its resources. However, recent work indicates that this is not a straightf...
Caroline Haythornthwaite
MINENET
2006
ACM
14 years 3 months ago
How to extract BGP peering information from the internet routing registry
We describe an on-line service, and its underlying methodology, designed to extract BGP peerings from the Internet Routing Registry. Both the method and the service are based on: ...
Giuseppe Di Battista, Tiziana Refice, Massimo Rimo...
SAC
2006
ACM
14 years 3 months ago
A dialogue on responsibility, moral agency, and IT systems
The dialogue that follows was written to express some of our ideas and remaining questions about IT systems, moral agency, and responsibility. We seem to have made some progress o...
Deborah G. Johnson, Keith W. Miller