Sciweavers

2849 search results - page 218 / 570
» Extracting Objects from the Web
Sort
View
FC
2007
Springer
117views Cryptology» more  FC 2007»
14 years 3 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
KCAP
2005
ACM
14 years 3 months ago
Collecting paraphrase corpora from volunteer contributors
Extensive and deep paraphrase corpora are important for a variety of natural language processing and user interaction tasks. In this paper, we present an approach which i) collect...
Timothy Chklovski
WWW
2006
ACM
14 years 10 months ago
Using graph matching techniques to wrap data from PDF documents
Wrapping is the process of navigating a data source, semiautomatically extracting data and transforming it into a form suitable for data processing applications. There are current...
Tamir Hassan, Robert Baumgartner
CGIM
2003
13 years 11 months ago
Snake for Band Edge Extraction and Its Applications
A novel snake model suitable for edge extraction of bandshape objects is presented in this paper. Based on the proposed model, an edge tracking system, EdgeTrak, has been develope...
Min Li, Chandra Kambhamettu, Maureen C. Stone
ICEIS
2003
IEEE
14 years 2 months ago
Incremental Horizontal Fragmentation of Database Class Objects
: Horizontal fragments of a class in an object-oriented database system contain subsets of the class extent or instance objects. These fragments are created with a set of system in...
Christie I. Ezeife, Pinakpani Dey