Sciweavers

1437 search results - page 119 / 288
» Content Extraction Signatures
Sort
View
JDFP
2008
81views more  JDFP 2008»
15 years 2 months ago
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Gary C. Kessler
128
Voted
WWW
2005
ACM
16 years 3 months ago
The volume and evolution of web page templates
Web pages contain a combination of unique content and template material, which is present across multiple pages and used primarily for formatting, navigation, and branding. We stu...
David Gibson, Kunal Punera, Andrew Tomkins
121
Voted
CEAS
2004
Springer
15 years 8 months ago
Word Stemming to Enhance Spam Filtering
Generally a content based spam filter works on words and phrases of email text and if it finds offensive content it gives that email a numerical value (depending on the content). A...
Shabbir Ahmed, Farzana Mithun
128
Voted
WEBIST
2008
15 years 4 months ago
Feeling Expression Using Avatars and Its Consistency for Subjective Annotation
Consumer Generated Media(CGM) is growing rapidly and the amount of content is increasing. However, it is often difficult for users to extract important contents and the existence o...
Fuyuko Ito, Yasunari Sasaki, Tomoyuki Hiroyasu, Mi...
157
Voted
AVI
2010
15 years 3 months ago
An architecture and a visual interface for tagging the 3D web
Content classification performed by end users is spreading through the web. Most of the work done so far is related to the hypermedia web. In spite of that, there is a growing mas...
Fabio Pittarello