Sciweavers

1211 search results - page 231 / 243
» Computing Manipulations of Ranking Systems
Sort
View
IJSWIS
2006
168views more  IJSWIS 2006»
13 years 7 months ago
Unraveling the Taste Fabric of Social Networks
Popular online social networks such as Friendster and MySpace do more than simply reveal the superficial structure of social connectedness--the rich meanings bottled within social...
Hugo Liu, Pattie Maes, Glorianna Davenport
BMCBI
2004
136views more  BMCBI 2004»
13 years 7 months ago
A SNP-centric database for the investigation of the human genome
Background: Single Nucleotide Polymorphisms (SNPs) are an increasingly important tool for genetic and biomedical research. Although current genomic databases contain information o...
Alberto Riva, Isaac S. Kohane
ACSAC
2010
IEEE
13 years 5 months ago
Breaking e-banking CAPTCHAs
Many financial institutions have deployed CAPTCHAs to protect their services (e.g., e-banking) from automated attacks. In addition to CAPTCHAs for login, CAPTCHAs are also used to...
Shujun Li, S. Amier Haider Shah, M. Asad Usman Kha...
TOG
2012
258views Communications» more  TOG 2012»
11 years 10 months ago
Stitch meshes for modeling knitted clothing with yarn-level detail
ike abstraction of the yarn model; (c) then, we specify the desired knitting pattern over the stitch mesh’s surface. (d) Following the interactive modeling process, the model goe...
Cem Yuksel, Jonathan M. Kaldor, Doug L. James, Ste...
CCS
2009
ACM
14 years 2 months ago
Dynamic provable data possession
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has receiv...
C. Christopher Erway, Alptekin Küpç&uu...