NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Nickerson, Gord – Computers in Libraries, 1992
Describes the development of Usenet, the User's Network, a computer network that distributes group discussions (newsgroups) on different topics. Network News software is described, the rapid growth in popularity and heavy network traffic is discussed, and a hierarchical classification scheme to limit the amount of information for users is…
Descriptors: Classification, Computer Networks, Computer Software, Computer System Design
Peer reviewed Peer reviewed
Direct linkDirect link
Saleh, Mostafa S. – E-Learning, 2005
The new e-learning generation depends on Semantic Web technology to produce learning objects. As the production of these components is very costly, they should be produced and registered once, and reused and adapted in the same context or in other contexts as often as possible. To produce those components, developers should use learning standards…
Descriptors: Electronic Learning, Educational Technology, Metadata, Educational Resources
Peer reviewed Peer reviewed
Philip, G.; And Others – Information Services and Use, 1991
Describes the design and development of an image database for photographs in the Ulster Museum (Northern Ireland) that used parallelism from a transputer network. Topics addressed include image processing techniques; documentation needed for the photographs, including indexing, classifying, and cataloging; problems; hardware and software aspects;…
Descriptors: Cataloging, Classification, Computer Networks, Computer Software