User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
We consider the problem of entity tagging: given one or more named entities from a specific domain, the goal is to automatically associate descriptive phrases, referred to as eta...
Kaushik Chakrabarti, Surajit Chaudhuri, Tao Cheng,...
The use of geographic data through Web services shows the geospatial Web Services (GWS). A growing number of GWS designed to interoperate spatial information over the network have...
Selecting items in cascading pull-down menus is a frequent task in most GUIs. These selections involve two major components: steering and selection, with the steering component be...
Erum Tanvir, Jonathan Cullen, Pourang Irani, Andy ...
Experiences of intimacy and connectedness through social networks are vital to human sense of well-being. We live in an electronic habitat. Electronic mail functions as a medium o...