Sciweavers

882 search results - page 75 / 177
» Application portals: practice and experience
Sort
View
SAC
2010
ACM
14 years 2 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
AP2PC
2004
Springer
14 years 1 months ago
An Agent Module for a System on Mobile Devices
A Middleware is the software that assists an application to interact or communicate with other applications, networks, hardware, and/or operating systems. We have earlier proposed ...
Praveen Madiraju, Sushil K. Prasad, Rajshekhar Sun...
LREC
2008
136views Education» more  LREC 2008»
13 years 9 months ago
A Coreference Corpus and Resolution System for Dutch
We present the main outcomes of the COREA project: a corpus annotated with coreferential relations and a coreference resolution system for Dutch. We discuss the annotation of the ...
Iris Hendrickx, Gosse Bouma, Frederik Coppens, Wal...
BCSHCI
2009
13 years 9 months ago
Evolving and augmenting worth mapping for family archives
We describe the process of developing worth maps from field research and initial design sketches for a digital Family Archive, which resulted in a more simple and flexible worth m...
Gilbert Cockton, David S. Kirk, Abigail Sellen, Ri...
ICC
2008
IEEE
164views Communications» more  ICC 2008»
14 years 2 months ago
Detection of Encrypted Tunnels Across Network Boundaries
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...