Sciweavers

15781 search results - page 2907 / 3157
» Evaluating Information Extraction
Sort
View
ESORICS
2011
Springer
14 years 4 months ago
Automatic and Precise Client-Side Protection against CSRF Attacks
A common client-side countermeasure against Cross Site Request Forgery (CSRF) is to strip session and authentication information from malicious requests. The difficulty however is ...
Philippe De Ryck, Lieven Desmet, Wouter Joosen, Fr...
HUC
2011
Springer
14 years 4 months ago
Exploring micro-incentive strategies for participant compensation in high-burden studies
Micro-incentives represent a new but little-studied trend in participant compensation for user studies. In this paper, we use a combination of statistical analysis and models from...
Mohamed Musthag, Andrew Raij, Deepak Ganesan, Sant...
IACR
2011
94views more  IACR 2011»
14 years 4 months ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...
ICDAR
2011
IEEE
14 years 4 months ago
BLSTM Neural Network Based Word Retrieval for Hindi Documents
—Retrieval from Hindi document image collections is a challenging task. This is partly due to the complexity of the script, which has more than 800 unique ligatures. In addition,...
Raman Jain, Volkmar Frinken, C. V. Jawahar, Raghav...
ICDAR
2011
IEEE
14 years 4 months ago
Discovering Legible Chinese Typefaces for Reading Digital Documents
More and more fonts have sprung up in recent years in digital publishing industry and reading devices. In this paper, we focus on methods of evaluating digital Chinese fonts and t...
Bing Zhang, Ying Li, Ching Y. Suen, Xuemin Zhang
« Prev « First page 2907 / 3157 Last » Next »