Sciweavers

503 search results - page 40 / 101
» Authenticity by tagging and typing
Sort
View
CHI
2011
ACM
13 years 13 days ago
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes
While a large body of research on image-based authentication has focused on memorability, comparatively less attention has been paid to the new security challenges these schemes m...
Eiji Hayashi, Jason Hong, Nicolas Christin
ICDT
2003
ACM
127views Database» more  ICDT 2003»
14 years 2 months ago
Incremental Validation of XML Documents
We investigate the incremental validation of XML documents with respect to DTDs and XML Schemas, under updates consisting of element tag renamings, insertions and deletions. DTDs ...
Yannis Papakonstantinou, Victor Vianu
SPIESR
1996
121views Database» more  SPIESR 1996»
13 years 10 months ago
I/Browse: The Bellcore Video Library Toolkit
I/Browse: The Bellcore Video Library Toolkit is a set of tools for constructing and browsing libraries of digital video. The toolkit is designed to work with video libraries on lo...
Paul England, Robert B. Allen, Mark Sullivan, Andr...
TREC
2007
13 years 10 months ago
DUTIR at TREC 2007 Blog Track
This paper describes DUTIR at TREC 2007 Blog Track. In data preprocessing, a non English language list created from the corpus was used to remove the non English blogs, blog templ...
Rui Song, Qin Tang, Daming Shi 0002, Hongfei Lin, ...
ACL
2006
13 years 10 months ago
Analysis and Repair of Name Tagger Errors
Name tagging is a critical early stage in many natural language processing pipelines. In this paper we analyze the types of errors produced by a tagger, distinguishing name classi...
Heng Ji, Ralph Grishman