Sciweavers

1018 search results - page 140 / 204
» Remote User Authentication Using Public Information
Sort
View
ERCIMDL
2005
Springer
99views Education» more  ERCIMDL 2005»
14 years 1 months ago
Management and Sharing of Bibliographies
Abstract. Managing bibliographic data is a requirement for many researchers, and in the group setting within which the majority of research takes place, the managing and sharing of...
Erik Wilde, Sai Anand, Petra Zimmermann
CSE
2009
IEEE
14 years 2 months ago
Large Online Social Footprints-An Emerging Threat
—We study large online social footprints by collecting data on 13,990 active users. After parsing data from 10 of the 15 most popular social networking sites, we find that a use...
Danesh Irani, Steve Webb, Kang Li, Calton Pu
SOUPS
2009
ACM
14 years 2 months ago
Balancing usability and security in a video CAPTCHA
We present a technique for using content-based video labeling as a CAPTCHA task. Our CAPTCHAs are generated from YouTube videos, which contain labels (tags) supplied by the person...
Kurt Alfred Kluever, Richard Zanibbi
DOCENG
2009
ACM
14 years 2 months ago
Web document text and images extraction using DOM analysis and natural language processing
: © Web Document Text and Images Extraction using DOM Analysis and Natural Language Processing Parag Mulendra Joshi, Sam Liu HP Laboratories HPL-2009-187 Web page text extraction,...
Parag Mulendra Joshi, Sam Liu
DIGITALCITIES
2000
Springer
14 years 8 days ago
Extending the Services and the Accessibility of Community Networks
Community networks are community-oriented information and communication systems that are generally patterned after the public library’s model of free, inclusive service and commi...
Antonietta Grasso, Dave Snowdon, Michael Koch