Search (712 results, page 1 of 36)

  • × year_i:[2000 TO 2010}
  • × language_ss:"e"
  1. Hotho, A.; Bloehdorn, S.: Data Mining 2004 : Text classification by boosting weak learners based on terms and concepts (2004) 0.11
    0.11318815 = product of:
      0.28297037 = sum of:
        0.2417292 = weight(_text_:3a in 562) [ClassicSimilarity], result of:
          0.2417292 = score(doc=562,freq=2.0), product of:
            0.43010932 = queryWeight, product of:
              8.478011 = idf(docFreq=24, maxDocs=44218)
              0.050732337 = queryNorm
            0.56201804 = fieldWeight in 562, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              8.478011 = idf(docFreq=24, maxDocs=44218)
              0.046875 = fieldNorm(doc=562)
        0.041241184 = weight(_text_:22 in 562) [ClassicSimilarity], result of:
          0.041241184 = score(doc=562,freq=2.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.23214069 = fieldWeight in 562, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.046875 = fieldNorm(doc=562)
      0.4 = coord(2/5)
    
    Content
    Vgl.: http://www.google.de/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CEAQFjAA&url=http%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fdownload%3Fdoi%3D10.1.1.91.4940%26rep%3Drep1%26type%3Dpdf&ei=dOXrUMeIDYHDtQahsIGACg&usg=AFQjCNHFWVh6gNPvnOrOS9R3rkrXCNVD-A&sig2=5I2F5evRfMnsttSgFF9g7Q&bvm=bv.1357316858,d.Yms.
    Date
    8. 1.2013 10:22:32
  2. Meho, L.I.: E-Mail interviewing in qualitative research : a methodological discussion (2006) 0.07
    0.06757558 = product of:
      0.3378779 = sum of:
        0.3378779 = weight(_text_:mail in 5701) [ClassicSimilarity], result of:
          0.3378779 = score(doc=5701,freq=12.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            1.2008058 = fieldWeight in 5701, product of:
              3.4641016 = tf(freq=12.0), with freq of:
                12.0 = termFreq=12.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.0625 = fieldNorm(doc=5701)
      0.2 = coord(1/5)
    
    Abstract
    This article summarizes findings from studies that employed electronic mail (e-mail) for conducting indepth interviewing. It discusses the benefits of, and the challenges associated with, using e-mail interviewing in qualitative research. The article concludes that while a mixed mode interviewing strategy should be considered when possible, e-mail interviewing can be in many cases a viable alternative to face-to-face and telephone interviewing. A list of recommendations for carrying out effective e-mail interviews is presented.
  3. Alberts, I.; Bertrand-Gastaldy, S.: ¬A pragmatic perspective of E-mail management practices in two Canadian public administrations (2008) 0.06
    0.058522176 = product of:
      0.29261088 = sum of:
        0.29261088 = weight(_text_:mail in 2282) [ClassicSimilarity], result of:
          0.29261088 = score(doc=2282,freq=16.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            1.0399284 = fieldWeight in 2282, product of:
              4.0 = tf(freq=16.0), with freq of:
                16.0 = termFreq=16.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.046875 = fieldNorm(doc=2282)
      0.2 = coord(1/5)
    
    Content
    This paper examines the prevalent contextual factors involved in the work of middle managers as they read and classify e-mail within two Canadian public administrations. Looking at e-mail through the lens of pragmatics and genre theory, the intent here is to devise a solution to alleviate issues associated with e-mail management practices. Resulting from this research, the E-mail Pragmatic Framework is presented. This framework takes into account prevailing individual, contextual and textual factors in the reading and classification of e-mail. As an alternative to speech act theory, a typology of e-mail pragmatic functions aiming to capture the expectations of middle managers as they interact with the e-mail genre is outlined.
  4. 3. RSWK-Ergänzungslieferung (2005) 0.06
    0.0578779 = product of:
      0.14469475 = sum of:
        0.103453554 = weight(_text_:mail in 3995) [ClassicSimilarity], result of:
          0.103453554 = score(doc=3995,freq=2.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.36767018 = fieldWeight in 3995, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.046875 = fieldNorm(doc=3995)
        0.041241184 = weight(_text_:22 in 3995) [ClassicSimilarity], result of:
          0.041241184 = score(doc=3995,freq=2.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.23214069 = fieldWeight in 3995, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.046875 = fieldNorm(doc=3995)
      0.4 = coord(2/5)
    
    Content
    "Die Deutsche Bibliothek hat die 3. RSWK-Ergänzungslieferung zur 3. Auflage der »Regeln für den Schlagwortkatalog (RSWK)« veröffentlicht - zum ersten Mal auch in elektronischer Form: www.ddb.de/produkte/publ elektron.htm <urn: nbn:de:1111-2004072169> http://nbn-resolving.de/urn/resolver.pl?urn=urn:nbn:de:11112004072169. Die Ergänzungslieferung enthält unter anderem Änderungen an § 8,2 (hier wurde die Priorisierung der Individualnamen zu Ungunsten der Allgemeinbegriffe aufgehoben), § 12,8 (Wegfall der Pauschalverweisungen), § 701 (durch eine neue Darstellung der Hinweissätze sind auch die Mundarten betroffen) sowie § 730 (Bauwerke). Nach einem im Sommer 2004 durchgeführten öffentlichen Stellungnahmeverfahren, für das die vorgesehenen Entwürfe auf dem FTP-Server Der Deutschen Bibliothek zur Verfügung standen, und einer Beratung in der Expertengruppe RSWK/SWD hat der Standardisierungsausschuss die 3. RSWK-Ergänzungslieferung mit den genannten Neuregelungen genehmigt. Die Papierausgabe der 3. RSWK-Ergänzungslieferung ist zum Preis von 13 Euro (zuzüglich Porto) zu beziehen über Die Deutsche Bibliothek, Zentrale bibliografische Dienstleistungen, Adickesallee 1, 60322 Frankfurt am Main; Telefax 0 69/15 25-16 36, E-Mail <junker@dbf.ddb.de>"
    Date
    22. 9.2005 19:42:31
  5. Stamatatos, E.: ¬A survey of modern authorship attribution methods (2009) 0.06
    0.0578779 = product of:
      0.14469475 = sum of:
        0.103453554 = weight(_text_:mail in 2741) [ClassicSimilarity], result of:
          0.103453554 = score(doc=2741,freq=2.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.36767018 = fieldWeight in 2741, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.046875 = fieldNorm(doc=2741)
        0.041241184 = weight(_text_:22 in 2741) [ClassicSimilarity], result of:
          0.041241184 = score(doc=2741,freq=2.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.23214069 = fieldWeight in 2741, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.046875 = fieldNorm(doc=2741)
      0.4 = coord(2/5)
    
    Abstract
    Authorship attribution supported by statistical or computational methods has a long history starting from the 19th century and is marked by the seminal study of Mosteller and Wallace (1964) on the authorship of the disputed Federalist Papers. During the last decade, this scientific field has been developed substantially, taking advantage of research advances in areas such as machine learning, information retrieval, and natural language processing. The plethora of available electronic texts (e.g., e-mail messages, online forum messages, blogs, source code, etc.) indicates a wide variety of applications of this technology, provided it is able to handle short and noisy text from multiple candidate authors. In this article, a survey of recent advances of the automated approaches to attributing authorship is presented, examining their characteristics for both text representation and text classification. The focus of this survey is on computational requirements and settings rather than on linguistic or literary issues. We also discuss evaluation methodologies and criteria for authorship attribution studies and list open questions that will attract future work in this area.
    Date
    22. 3.2009 17:44:32
  6. Vetere, G.; Lenzerini, M.: Models for semantic interoperability in service-oriented architectures (2005) 0.06
    0.056403484 = product of:
      0.2820174 = sum of:
        0.2820174 = weight(_text_:3a in 306) [ClassicSimilarity], result of:
          0.2820174 = score(doc=306,freq=2.0), product of:
            0.43010932 = queryWeight, product of:
              8.478011 = idf(docFreq=24, maxDocs=44218)
              0.050732337 = queryNorm
            0.65568775 = fieldWeight in 306, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              8.478011 = idf(docFreq=24, maxDocs=44218)
              0.0546875 = fieldNorm(doc=306)
      0.2 = coord(1/5)
    
    Content
    Vgl.: http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5386707&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5386707.
  7. Perer, A.; Shneiderman, B.; Oard, D.W.: Using rhythms of relationships to understand e-mail archives (2006) 0.05
    0.054742485 = product of:
      0.27371243 = sum of:
        0.27371243 = weight(_text_:mail in 207) [ClassicSimilarity], result of:
          0.27371243 = score(doc=207,freq=14.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.972764 = fieldWeight in 207, product of:
              3.7416575 = tf(freq=14.0), with freq of:
                14.0 = termFreq=14.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.046875 = fieldNorm(doc=207)
      0.2 = coord(1/5)
    
    Abstract
    Due to e-mail's ubiquitous nature, millions of users are intimate with the technology; however, most users are only familiar with managing their own e-mail, which is an inherently different task from exploring an e-mail archive. Historians and social scientists believe that e-mail archives are important artifacts for understanding the individuals and communities they represent. To understand the conversations evidenced in an archive, context is needed. In this article, we present a new way to gain this necessary context: analyzing the temporal rhythms of social relationships. We provide methods for constructing meaningful rhythms from the e-mail headers by identifying relationships and interpreting their attributes. With these visualization techniques, e-mail archive explorers can uncover insights that may have been otherwise hidden in the archive. We apply our methods to an individual's 15-year e-mail archive, which consists of about 45,000 messages and over 4,000 relationships.
  8. Pera, M.S.; Ng, Y.-K.: SpamED : a spam E-mail detection approach based on phrase similarity (2009) 0.05
    0.054742485 = product of:
      0.27371243 = sum of:
        0.27371243 = weight(_text_:mail in 2721) [ClassicSimilarity], result of:
          0.27371243 = score(doc=2721,freq=14.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.972764 = fieldWeight in 2721, product of:
              3.7416575 = tf(freq=14.0), with freq of:
                14.0 = termFreq=14.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.046875 = fieldNorm(doc=2721)
      0.2 = coord(1/5)
    
    Abstract
    E-mail messages are unquestionably one of the most popular communication media these days. Not only are they fast and reliable but also free in general. Unfortunately, a significant number of e-mail messages received by e-mail users on a daily basis are spam. This fact is annoying since spam messages translate into a waste of the user's time in reviewing and deleting them. In addition, spam messages consume resources such as storage, bandwidth, and computer-processing time. Many attempts have been made in the past to eradicate spam; however, none has proven highly effective. In this article, we propose a spam e-mail detection approach, called SpamED, which uses the similarity of phrases in messages to detect spam. Conducted experiments not only verify that SpamED using trigrams in e-mail messages is capable of minimizing false positives and false negatives in spam detection but it also outperforms a number of existing e-mail filtering approaches with a 96% accuracy rate.
  9. Mas, S.; Marleau, Y.: Proposition of a faceted classification model to support corporate information organization and digital records management (2009) 0.05
    0.04834584 = product of:
      0.2417292 = sum of:
        0.2417292 = weight(_text_:3a in 2918) [ClassicSimilarity], result of:
          0.2417292 = score(doc=2918,freq=2.0), product of:
            0.43010932 = queryWeight, product of:
              8.478011 = idf(docFreq=24, maxDocs=44218)
              0.050732337 = queryNorm
            0.56201804 = fieldWeight in 2918, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              8.478011 = idf(docFreq=24, maxDocs=44218)
              0.046875 = fieldNorm(doc=2918)
      0.2 = coord(1/5)
    
    Footnote
    Vgl.: http://ieeexplore.ieee.org/Xplore/login.jsp?reload=true&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F4755313%2F4755314%2F04755480.pdf%3Farnumber%3D4755480&authDecision=-203.
  10. Garcés, P.J.; Olivas, J.A.; Romero, F.P.: Concept-matching IR systems versus word-matching information retrieval systems : considering fuzzy interrelations for indexing Web pages (2006) 0.05
    0.048231583 = product of:
      0.12057896 = sum of:
        0.0862113 = weight(_text_:mail in 5288) [ClassicSimilarity], result of:
          0.0862113 = score(doc=5288,freq=2.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.30639184 = fieldWeight in 5288, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.0390625 = fieldNorm(doc=5288)
        0.034367654 = weight(_text_:22 in 5288) [ClassicSimilarity], result of:
          0.034367654 = score(doc=5288,freq=2.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.19345059 = fieldWeight in 5288, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.0390625 = fieldNorm(doc=5288)
      0.4 = coord(2/5)
    
    Abstract
    This article presents a semantic-based Web retrieval system that is capable of retrieving the Web pages that are conceptually related to the implicit concepts of the query. The concept of concept is managed from a fuzzy point of view by means of semantic areas. In this context, the proposed system improves most search engines that are based on matching words. The key of the system is to use a new version of the Fuzzy Interrelations and Synonymy-Based Concept Representation Model (FIS-CRM) to extract and represent the concepts contained in both the Web pages and the user query. This model, which was integrated into other tools such as the Fuzzy Interrelations and Synonymy based Searcher (FISS) metasearcher and the fz-mail system, considers the fuzzy synonymy and the fuzzy generality interrelations as a means of representing word interrelations (stored in a fuzzy synonymy dictionary and ontologies). The new version of the model, which is based on the study of the cooccurrences of synonyms, integrates a soft method for disambiguating word senses. This method also considers the context of the word to be disambiguated and the thematic ontologies and sets of synonyms stored in the dictionary.
    Date
    22. 7.2006 17:14:12
  11. Ackermann, E.: Piaget's constructivism, Papert's constructionism : what's the difference? (2001) 0.04
    0.040288202 = product of:
      0.201441 = sum of:
        0.201441 = weight(_text_:3a in 692) [ClassicSimilarity], result of:
          0.201441 = score(doc=692,freq=2.0), product of:
            0.43010932 = queryWeight, product of:
              8.478011 = idf(docFreq=24, maxDocs=44218)
              0.050732337 = queryNorm
            0.46834838 = fieldWeight in 692, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              8.478011 = idf(docFreq=24, maxDocs=44218)
              0.0390625 = fieldNorm(doc=692)
      0.2 = coord(1/5)
    
    Content
    Vgl.: https://www.semanticscholar.org/paper/Piaget-%E2%80%99-s-Constructivism-%2C-Papert-%E2%80%99-s-%3A-What-%E2%80%99-s-Ackermann/89cbcc1e740a4591443ff4765a6ae8df0fdf5554. Darunter weitere Hinweise auf verwandte Beiträge. Auch unter: Learning Group Publication 5(2001) no.3, S.438.
  12. Information ethics : privacy, property, and power (2005) 0.04
    0.039585114 = product of:
      0.098962784 = sum of:
        0.07466118 = weight(_text_:mail in 2392) [ClassicSimilarity], result of:
          0.07466118 = score(doc=2392,freq=6.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.26534313 = fieldWeight in 2392, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
        0.024301602 = weight(_text_:22 in 2392) [ClassicSimilarity], result of:
          0.024301602 = score(doc=2392,freq=4.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.13679022 = fieldWeight in 2392, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.01953125 = fieldNorm(doc=2392)
      0.4 = coord(2/5)
    
    Classification
    323.44/5 22 (GBV;LoC)
    DDC
    323.44/5 22 (GBV;LoC)
    Footnote
    Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act.
    The book also includes an index, a selected bibliography, and endnotes for each article. More information on the authors of the articles would have been useful, however. One of the best features of Information Ethics is the discussion cases at the end of each chapter. For instance, in the discussion cases, Moore asks questions like: Would you allow one person to die to save nine? Should a scientist be allowed to experiment on people without their knowledge if there is no harm? Should marriages between people carrying a certain gene be outlawed? These discussion cases really add to the value of the readings. The only suggestion would be to have put them at the beginning of each section so the reader could have the questions floating in their heads as they read the material. Information Ethics is a well thought out and organized collection of articles. Moore has done an excellent job of finding articles to provide a fair and balanced look at a variety of complicated and far-reaching topics. Further, the work has breadth and depth. Moore is careful to include enough historical articles, like the 1890 Warren article, to give balance and perspective to new and modern topics like E-mail surveillance, biopiracy, and genetics. This provides a reader with just enough philosophy and history theory to work with the material. The articles are written by a variety of authors from differing fields so they range in length, tone, and style, creating a rich tapestry of ideas and arguments. However, this is not a quick or easy read. The subject matter is complex and one should plan to spend time with the book. The book is well worth the effort though. Overall, this is a highly recommended work for all libraries especially academic ones."
  13. Dunsire, G.: ¬The Internet as a tool for cataloguing and classification, a view from the UK (2000) 0.03
    0.03448452 = product of:
      0.1724226 = sum of:
        0.1724226 = weight(_text_:mail in 6062) [ClassicSimilarity], result of:
          0.1724226 = score(doc=6062,freq=2.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.6127837 = fieldWeight in 6062, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.078125 = fieldNorm(doc=6062)
      0.2 = coord(1/5)
    
    Abstract
    The use of various Internet services by library cataloguers and subject classifiers is discussed, with special reference to Scotland and the remainder of the United Kingdom. Services include e-mail, FTP, and Websites
  14. Stojanovic, N.: Ontology-based Information Retrieval : methods and tools for cooperative query answering (2005) 0.03
    0.03223056 = product of:
      0.1611528 = sum of:
        0.1611528 = weight(_text_:3a in 701) [ClassicSimilarity], result of:
          0.1611528 = score(doc=701,freq=2.0), product of:
            0.43010932 = queryWeight, product of:
              8.478011 = idf(docFreq=24, maxDocs=44218)
              0.050732337 = queryNorm
            0.3746787 = fieldWeight in 701, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              8.478011 = idf(docFreq=24, maxDocs=44218)
              0.03125 = fieldNorm(doc=701)
      0.2 = coord(1/5)
    
    Content
    Vgl.: http%3A%2F%2Fdigbib.ubka.uni-karlsruhe.de%2Fvolltexte%2Fdocuments%2F1627&ei=tAtYUYrBNoHKtQb3l4GYBw&usg=AFQjCNHeaxKkKU3-u54LWxMNYGXaaDLCGw&sig2=8WykXWQoDKjDSdGtAakH2Q&bvm=bv.44442042,d.Yms.
  15. Hawking, D.; Robertson, S.: On collection size and retrieval effectiveness (2003) 0.03
    0.031106053 = product of:
      0.15553026 = sum of:
        0.15553026 = weight(_text_:22 in 4109) [ClassicSimilarity], result of:
          0.15553026 = score(doc=4109,freq=4.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.8754574 = fieldWeight in 4109, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.125 = fieldNorm(doc=4109)
      0.2 = coord(1/5)
    
    Date
    14. 8.2005 14:22:22
  16. Meho, L.I.; Tibbo, H.R.: Modeling the information-seeking behavior of social scientists Ellis's study revisited (2003) 0.03
    0.029864473 = product of:
      0.14932236 = sum of:
        0.14932236 = weight(_text_:mail in 5170) [ClassicSimilarity], result of:
          0.14932236 = score(doc=5170,freq=6.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.53068626 = fieldWeight in 5170, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.0390625 = fieldNorm(doc=5170)
      0.2 = coord(1/5)
    
    Abstract
    Meho and Tibbo show that the Ellis model of information seeking applies to a web environment by way of a replication of his study in this case using behavior of social science faculty studying stateless nations, a group diverse in skills, origins, and research specialities. Data were collected by way of e-mail interviews. Material on stateless nations was limited to papers in English on social science topics published between 1998 and 2000. Of these 251 had 212 unique authors identified as academic scholars and had sufficient information to provide e-mail addresses. Of the 139 whose addresses were located, 9 who were physically close were reserved for face to face interviews, and of the remainder 60 agreed to participate and responded to the 25 open ended question interview. Follow up questions generated a 75% response. Of the possible face to face interviews five agreed to participate and provided 26 thousand words as opposed to 69 thousand by the 45 e-mail participants. The activities of the Ellis model are confirmed but four additional activities are also identified. These are accessing, i.e. finding the material identified in indirect sources of information; networking, or the maintaining of close contacts with a wide range of colleagues and other human sources; verifying, i.e. checking the accuracy of new information; and information managing, the filing and organizing of collected information. All activities are grouped into four stages searching, accessing, processing, and ending.
  17. Kuflik, T.; Shapira, B.; Shoval, P.: Stereotype-based versus personal-based filtering rules in information filtering systems (2003) 0.03
    0.029261088 = product of:
      0.14630544 = sum of:
        0.14630544 = weight(_text_:mail in 1234) [ClassicSimilarity], result of:
          0.14630544 = score(doc=1234,freq=4.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.5199642 = fieldWeight in 1234, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.046875 = fieldNorm(doc=1234)
      0.2 = coord(1/5)
    
    Abstract
    Kuflick, et alia, test whether an e-mail filter based on personally designed rules will be as effective as one whose rules are designed to reflect the average user in a specified group of users. Using a prototype filtering system ten subjects were interviewed to construct their own personal rules and were also assigned to one of four predefined rule sets generated by cluster analysis from 40 interviews using the same instrument with like subjects. Assignment was based upon social parameters such as education, profession, and computer knowledge level in the data gathered. The rules led to assignment of a relevance number in the range 1 to 7 to each message based upon the participant chosen values of goal, length, and history parameters of the message. A set of e-mail messages was then supplied to the 10 subjects who ranked them as to relevance. Pearson coefficients between personal rule ranks and user ranks are consistently lower than the correlations between user ranks and the stereotype ranks but in only three cases significantly so.
  18. Olsen, K.A.: ¬The Internet, the Web, and eBusiness : formalizing applications for the real world (2005) 0.03
    0.029031634 = product of:
      0.072579086 = sum of:
        0.048768476 = weight(_text_:mail in 149) [ClassicSimilarity], result of:
          0.048768476 = score(doc=149,freq=4.0), product of:
            0.28137597 = queryWeight, product of:
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.050732337 = queryNorm
            0.1733214 = fieldWeight in 149, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              5.5462847 = idf(docFreq=468, maxDocs=44218)
              0.015625 = fieldNorm(doc=149)
        0.02381061 = weight(_text_:22 in 149) [ClassicSimilarity], result of:
          0.02381061 = score(doc=149,freq=6.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.1340265 = fieldWeight in 149, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.015625 = fieldNorm(doc=149)
      0.4 = coord(2/5)
    
    Classification
    004.678 22
    DDC
    004.678 22
    Footnote
    Each chapter provides suggestions for exercises and discussions, which makes the book useful as a textbook. The suggestions in the exercise and discussion section at the end of each chapter are simply delightful to read and provide a basis for some lively discussion and fun exercises by students. These exercises appear to be well thought out and are intended to highlight the content of the chapter. The notes at the end of chapters provide valuable data that help the reader to understand a topic or a reference to an entity that the reader may not know. Chapter 1 on "formalism," chapter 2 on "symbolic data," chapter 3 on "constraints on technology," and chapter 4 on "cultural constraints" are extremely well presented and every reader needs to read these chapters because they lay the foundation for most of the chapters that follow. The analogies, examples, and points of view presented make for some really interesting reading and lively debate and discussion. These chapters comprise Part 1 of the book and not only provide a foundation for the rest of the book but could be used alone as the basis of a social science course on computing, networking, and the Web. Chapters 5 and 6 on Internet protocols and the development of Web protocols may be more detailed and filled with more acronyms than the average person wants to deal with but content is presented with analogies and examples that make it easier to digest. Chapter 7 will capture most readers attention because it discusses how e-mail works and many of the issues with e-mail, which a majority of people in developed countries have dealt with. Chapter 8 is also one that most people will be interested in reading because it shows how Internet browsers work and the many issues such as security associated with these software entities. Chapter 9 discusses the what, why, and how of the World Wide Web, which is a lead-in to chapter 10 on "Searching the Web" and chapter 11 on "Organizing the Web-Portals," which are two chapters that even technically oriented people should read since it provides information that most people outside of information and library science are not likely to know.
    Chapter 12 on "Web Presence" is a useful discussion of what it means to have a Web site that is indexed by a spider from a major Web search engine. Chapter 13 on "Mobile Computing" is very well done and gives the reader a solid basis of what is involved with mobile computing without overwhelming them with technical details. Chapter 14 discusses the difference between pull technologies and push technologies using the Web that is understandable to almost anyone who has ever used the Web. Chapters 15, 16, and 17 are for the technically stout at heart; they cover "Dynamic Web Pages," " Embedded Scripts," and "Peer-to-Peer Computing." These three chapters will tend to dampen the spirits of anyone who does not come from a technical background. Chapter 18 on "Symbolic Services-Information Providers" and chapter 19 on "OnLine Symbolic Services-Case Studies" are ideal for class discussion and students assignments as is chapter 20, "Online Retail Shopping-Physical Items." Chapter 21 presents a number of case studies on the "Technical Constraints" discussed in chapter 3 and chapter 22 presents case studies on the "Cultural Constraints" discussed in chapter 4. These case studies are not only presented in an interesting manner they focus on situations that most Web users have encountered but never really given much thought to. Chapter 24 "A Better Model?" discusses a combined "formalized/unformalized" model that might make Web applications such as banking and booking travel work better than the current models. This chapter will cause readers to think about the role of formalization and the unformalized processes that are involved in any application. Chapters 24, 25, 26, and 27 which discuss the role of "Data Exchange," "Formalized Data Exchange," "Electronic Data Interchange-EDI," and "XML" in business-to-business applications on the Web may stress the limits of the nontechnically oriented reader even though it is presented in a very understandable manner. Chapters 28, 29, 30, and 31 discuss Web services, the automated value chain, electronic market places, and outsourcing, which are of high interest to business students, businessmen, and designers of Web applications and can be skimmed by others who want to understand ebusiness but are not interested in the details. In Part 5, the chapters 32, 33, and 34 on "Interfacing with the Web of the Future," "A Disruptive Technology," "Virtual Businesses," and "Semantic Web," were, for me, who teaches courses in IT and develops ebusiness applications the most interesting chapters in the book because they provided some useful insights about what is likely to happen in the future. The summary in part 6 of the book is quite well done and I wish I had read it before I started reading the other parts of the book.
  19. Buzydlowski, J.W.; White, H.D.; Lin, X.: Term Co-occurrence Analysis as an Interface for Digital Libraries (2002) 0.03
    0.028572733 = product of:
      0.14286366 = sum of:
        0.14286366 = weight(_text_:22 in 1339) [ClassicSimilarity], result of:
          0.14286366 = score(doc=1339,freq=6.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.804159 = fieldWeight in 1339, product of:
              2.4494898 = tf(freq=6.0), with freq of:
                6.0 = termFreq=6.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.09375 = fieldNorm(doc=1339)
      0.2 = coord(1/5)
    
    Date
    22. 2.2003 17:25:39
    22. 2.2003 18:16:22
  20. Hemminger, B.M.: Introduction to the special issue on bioinformatics (2005) 0.03
    0.027217796 = product of:
      0.13608898 = sum of:
        0.13608898 = weight(_text_:22 in 4189) [ClassicSimilarity], result of:
          0.13608898 = score(doc=4189,freq=4.0), product of:
            0.177656 = queryWeight, product of:
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.050732337 = queryNorm
            0.76602525 = fieldWeight in 4189, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.5018296 = idf(docFreq=3622, maxDocs=44218)
              0.109375 = fieldNorm(doc=4189)
      0.2 = coord(1/5)
    
    Date
    22. 7.2006 14:19:22

Types

  • a 600
  • m 72
  • el 45
  • s 31
  • b 24
  • x 2
  • i 1
  • n 1
  • r 1
  • More… Less…

Themes

Subjects

Classifications