Recent posts

Social Phishing

less than 1 minute read

by Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, and Filippo Menczer This article covers various aspects of phishing attacks luring users into disc...

Build, Sharing, and Merging Ontologies

less than 1 minute read

by John F. Sowa An excellent article (available online here) I got recommended by on of the reviewer of our "ontology evolution paper". The paper starts with...

Online socialising…

less than 1 minute read

...an article I got from Walter without any reference to the author. Two facts the article mentioned I found particular interesting: News Corp. was paying a...

What Anyone Can Know

less than 1 minute read

- The Privacy Risks of Social Networking Sites by David Rosenblum This article describes the professional and personal risks, bad privacy and a wrong expecta...

Extreme Programming Explained

less than 1 minute read

by Kent Beck and Cynthia Andres I would like to point out some of the concepts and ideas presented in the book: small improvements: analyse the corrent proc...

What Is Web 2.0

less than 1 minute read

Design Patterns and Business Models for the Nexter Generation of Software by Tim O'Reilly (09/30/2005) An excellent article elaborating the concepts and idea...

Record Matching in Digital Library Metadata

less than 1 minute read

Kan, Min-Yen and Tan, Yee Fan: Record Matching in Digital Library Metdata, Communications of the ACM, Volume 51 (2), 91-94 The article provides an excellent ...

Sharing Knowledge

less than 1 minute read

by Peter Marks, Peter Polak, Scott McCoy and Dennis Galletta The idea of knowledge management systems (KMS) is unlocking knowledge heretofore only accessible...

Data Mining…

less than 1 minute read

Google Tech Talk; Data1 Some interesting stuff we learned in the course