Spyware is becoming a relentless onslaught from those seeking to capture and use private information for their own ends. Spyware is annoying and negatively impacts the computing experience. Even worse, there are real and significant threats to corporate and even national security from those who use and abuse spyware.
This article presents the results of our exploration of the Dewey Decimal Classification (Dewey) as a concept definition source for the Scorpion project. Particularly, we show that Dewey demonstrates a high degree of class integrity and thus is a good knowledge base for an automatic subject assignment tool. With the advent of desktop publishing and the… (More)
A network organization for implementing a document retrieval system is proposed. This organization has significant advantages in terms of the range of searches that can be used when compared to either inverted or clustered file organizations. Algorithms for generating and maintaining the network are described together with experiments designed to test their… (More)
This study developed and applied benchmarks for five indicators included in the CAH Financial Indicators Report, an annual, hospital-specific report distributed to all critical access hospitals (CAHs). An online survey of Chief Executive Officers and Chief Financial Officers was used to establish benchmarks. Indicator values for 2004, 2005, and 2006 were… (More)
In October of 1999, the Infosec Research Council created a Science and Technology Study Group (ISTSG) focused on malicious code. The purpose of the Malicious Code ISTSG is to develop a national research agenda to address the accelerating threat from malicious code. The study is intended to identify promising new approaches to dealing with the problems posed… (More)