Sciweavers

8728 search results - page 1678 / 1746
» On Reduct Construction Algorithms
Sort
View
WWW
2005
ACM
14 years 9 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten
WWW
2005
ACM
14 years 9 months ago
Fully automatic wrapper generation for search engines
When a query is submitted to a search engine, the search engine returns a dynamically generated result page containing the result records, each of which usually consists of a link...
Hongkun Zhao, Weiyi Meng, Zonghuan Wu, Vijay Ragha...
WWW
2005
ACM
14 years 9 months ago
An environment for collaborative content acquisition and editing by coordinated ubiquitous devices
Digital content is not only stored by servers on the Internet, but also on various embedded devices belonging to ubiquitous networks. In this paper, we propose a content processin...
Yutaka Kidawara, Tomoyuki Uchiyama, Katsumi Tanaka
WWW
2004
ACM
14 years 9 months ago
Mining models of human activities from the web
The ability to determine what day-to-day activity (such as cooking pasta, taking a pill, or watching a video) a person is performing is of interest in many application domains. A ...
Mike Perkowitz, Matthai Philipose, Kenneth P. Fish...
WWW
2003
ACM
14 years 9 months ago
P2Cast: peer-to-peer patching scheme for VoD service
Providing video on demand (VoD) service over the Internet in a scalable way is a challenging problem. In this paper, we propose P2Cast - an architecture that uses a peer-to-peer a...
Yang Guo, Kyoungwon Suh, James F. Kurose, Donald F...
« Prev « First page 1678 / 1746 Last » Next »