Tak W. Yan & Hector Garcia-Molina, SIFT--A Tool for Wide-Area Information Dissemination, 1995 USENIX Technical Conference, New Orleans, LA., Jan. 16-20, pp. 177-186. |
Masahiro Morita & Yoichi Shinoda, Information Filtering Based on User Behavior Analysis and Best Match Text Retrieval, Proceedings of the Seventeenth Annual Internatonal ACM-SIGIR Conference on Research and Development in Information Retrieval, Dublin, Jul. 3-6, 1994, Pages Title p. (272)-281. |
Jim Binkley & Leslie Young, Rama: An Architecture for Internet Information Filtering, Journal of Intelligent Information Systems: Integrating Artificial and Database Technologies, vol. 5, No. 2, Sep. 1995, pp. 81-99. |
Foltz, P.W., Dumais, S.T., "Personalized Information Delivery: An Analysis Of Information Filtering Methods", Communications of the ACM, Dec. 1992, vol. 35, No. 12, pp. 51-60. |
Belkin, N.J., Croft, W.B., "Information Filtering And Information Retrieval: Two Sides of the Same Coin?", Communications of the ACM, Dec. 1992, vol. 35, No. 12, pp. 29-38. |
Chalmers, M., Chitson, P., "Bead: Explorations In Information Visualization", 15th Ann. Int'l SIGIR "92/Denmark--Jun. 1992, pp. 330-337. |
Willett, P., "Recent Trends In Hierarchic Document Clustering: A Critical Review", Information Processing & Management, vol. 24, No. 5, pp. 557-597, 1988. |
Damashek, M., Gauging Similarity via N-Grams: Language-Independent Sorting, Categorization, and Retrieval of Text, pp. 1-11, Jan. 24, 1995. |
Salton G., "Developments in Automatic Text Retrieval", vol. 253, pp. 974-980, Aug. 30, 1991. |
Chaum, D., "Archieving Electronic Privacy", Scientific American, Aug. 1992, pp. 96-101. |
Loeb, S., "Architecting Personalized Delivery of Multimedia Information", Communications of the ACM, Dec. 1992, vol. 35, No. 12, pp. 39-50. |
Sincoskie, W.D. & Cotton C.J. "Extended Bridge Algorithms for Large Networks", IEEE Network, Jan. 1988-vol. 2, No. 1, pp. 16-24. |
Deering S.; Estrin, D.; Farinacci, D.; Jacobson, V.; Liu, C.; Wei, L; "An Architecture for Wide-Area Multicast Routing", Computer Communication Review, vol. 24, No. 4, Oct. 1994, Proceedings of SIGCOMM '94, pp. 126-135. |
Bolot, J.; Turletti, T. & Wakeman, I.; "Scalable Feedback Control for Multicast Video Distribution In the Internet", Computer Communication Review, vol. 24, No. 4, Oct. 1994, Proceedings of SIGCOMM '94, pp. 58-67. |
Rivest, R.L.; Shamir, A & Adleman, L.; "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM, Feb. 1978, vol. 21, No. 2, pp. 120-126. |
Chaum, D. "Security without Identification: Card Computers to Make Big Brother Obsolete", Communications of the ACM, 28(10), Oct. 1985, pp. 1030-1044. |
Chaum, D. "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms", Communictions of the ACM, vol. 24, No. 2, Feb., 1981. |
Sheth, B. & Maes, P. "Evolving Agents For Personalized Information Filtering", Proc. 9th IEEE Conference, 1993 pp. 345-352. |
Cutting, D.R.; Karger, D.R.; Pedersen, J.O. & Tukey, J.W. "Scatter/Gather: A Cluster-based Approach to Browsing Large Document Collections", 15 Ann. Int'l SIGIR '92, ACM, 1992, pp. 318-329. |
Rose, D.E.; Mander, R.; Oren, T., Ponceleon, D.B.; Salomon, G. & Wong, Y.Y. "Content Awareness in a File System Interface Implementing the `Pile` Metaphor for Organizing Information", 16 Ann. Int'l SIGIR '93, ACM, pp. 260-269. |