Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Objectives To assess low-income mothers’ perceptions of their postpartum information needs; describe their information seeking behavior; explore their use of mobile technology to address those needs; and to contribute to the sparse... more
    • by  and +1
    •   5  
      Qualitative methodologyPublic HealthHealth Information TechnologyMobile phones in everyday life
Large quantities of historical newspapers are being digitized and OCRd. We describe a framework for processing the OCRd text to identify articles and extract metadata for them. We describe the article schema and provide examples of... more
    • by 
    •   9  
      Information RetrievalHuman Computer InteractionDigital LibrariesText Mining
    • by 
    •   6  
      Network ManagementProtocolsSearch AlgorithmRouting Protocol
Automated configuration and management of highly dynamic networks is a challenging problem for network practitioners. Such online optimization of systems can be performed in two ways: (i) using a separate model of the system for... more
    • by 
    •   7  
      Genetic AlgorithmProbabilityProtocolsSystem modeling
    • by 
    • The
    • by 
    •   6  
      Internet Routing ProtocolGenetic AlgorithmNew TechnologyTraffic Flow
    • by  and +1
    • by 
    • by 
Services Oriented Architectures (SOA) have emerged as a useful framework for developing interoperable, large-scale systems, typically implemented using the Web Services (WS) standards. However, the maintenance and evolution of SOA systems... more
    • by  and +4
    •   9  
      Software EngineeringSocial NetworkingComputer NetworksSocial Network Analysis (SNA)
Intrusion detection systems have undergone numerous years of study and yet a great deal of problems remain; primarily a high percentage of false alarms and abysmal detection rates. A new type of threat has emerged that of Advanced... more
    • by 
    •   2  
      Network SecurityComputer Security
Six Degrees of Kevin Bacon refers to a game where you try to link any actor to Kevin Bacon by the fewest movies. Every actor has a Bacon number. If an actor appears in the same movie as Kevin Bacon his Bacon number is 1. This paper... more
    • by  and +1
    •   4  
      Social NetworksSocial NetworkingGenetic AlgorithmsSocial Network Analysis (SNA)
To improve the quality of search results in huge digital music databases, we developed a simple algorithm based on artist influences and complex network theory that produces interesting and novel results. Traditionally, music... more
    • by 
    •   4  
      Social NetworksSocial NetworkingComplex NetworksNetwork science
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices... more
    • by  and +5
E-loox is an educational software application that has been designed specifically for students located in areas with limited Internet access. Unlike the majority of existing educational applications, E-loox is a “hybrid app”– meaning it... more
    • by  and +1
    •   17  
      LanguagesSoftware EngineeringInformation RetrievalEducation
    • by 
    • Computer Applications
    • by 
    • Computer Applications
    • by 
    • by 
    • Business Analytics
The availability of sophisticated technologies and methods of perpetrating criminogenic activities in the cyberspace is a pertinent societal problem. Darknet is an encrypted network technology that uses the internet infrastructure and can... more
    • by 
    •   2  
      Computer SciencearXiv