Results 1 - 10
of
57,414
Email overload: exploring personal information management of email
- CHI 96 CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS
, 1996
"... Email is one of the most successful computer applications yet devised. Our empirical data show however, that although email was origirally designed as a communications application, it is now used for additional functions, that it was not designed for, such as task management and personal archiving. ..."
Abstract
-
Cited by 450 (28 self)
- Add to MetaCart
. We call this email overload. We demonstrate that email overload creates problems for personal information management: users often have cluttered inboxes containing hundreds of messages, including outstanding tasks, partially read documents and conversational threads. Furthermore, user attemtps
The protection of information in computer systems
"... This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sectio ..."
Abstract
-
Cited by 824 (2 self)
- Add to MetaCart
of protecting information in computers. Access The ability to make use of information stored in a computer system. Used frequently as a verb, to the horror of grammarians. Access control list A list of principals that are authorized to have access to some object. Authenticate To verify the identity of a person
Stuff I've seen: A system for personal information retrieval and re-use
- SIGIR '03
, 2003
"... Most information retrieval technologies are designed to facilitate information discovery. However, much knowledge work involves finding and re-using previously seen information. We describe the design and evaluation of a system, called Stuff Iâve Seen (SIS), that facilitates information re-use. Th ..."
Abstract
-
Cited by 350 (9 self)
- Add to MetaCart
-use. This is accomplished in two ways. First, the system provides a unified index of information that a person has seen, whether it was seen as email, web page, document, appointment, etc. Second, because the information has been seen before, rich contextual cues can be used in the search interface. The system has been
Social Information Filtering: Algorithms for Automating "Word of Mouth"
, 1995
"... This paper describes a technique for making personalized recommendations from any type of database to a user based on similarities between the interest profile of that user and those of other users. In particular, we discuss the implementation of a networked system called Ringo, which makes personal ..."
Abstract
-
Cited by 1159 (20 self)
- Add to MetaCart
personalized recommendations for music albums and artists. Ringo's database of users and artists grows dynamically as more people use the system and enter more information. Four different algorithms for making recommendations by using social information filtering were tested and compared. We present
Personal information:
, 2011
"... Experimental modelling of lateral loads on large diameter mono-pile foundations in sand ..."
Abstract
- Add to MetaCart
Experimental modelling of lateral loads on large diameter mono-pile foundations in sand
Personal Information:
"... 1998-2001: Analyst, for projects across a range of industries and countries 2001-2003: Case Team Leader, for projects in pharmaceuticals marketing and other industries ..."
Abstract
- Add to MetaCart
1998-2001: Analyst, for projects across a range of industries and countries 2001-2003: Case Team Leader, for projects in pharmaceuticals marketing and other industries
Personal Informations
"... Title of Thesis: Primary structure of hemocyanin from scorpion (Buthus sindicus) Jun-1991 Mar-1997 ..."
Abstract
- Add to MetaCart
Title of Thesis: Primary structure of hemocyanin from scorpion (Buthus sindicus) Jun-1991 Mar-1997
Results 1 - 10
of
57,414