Sciweavers

2469 search results - page 450 / 494
» Self-Protection of Web Content
Sort
View
WSC
2008
13 years 11 months ago
Simulating culture: An experiment using a multi-user virtual environment
With increased levels of global trade, foreign policy making, foreign travel, and distance collaboration using the Internet, the issue of culture takes center stage. One needs to ...
Paul A. Fishwick, Julie Henderson, Elinore Fresh, ...
ASWC
2008
Springer
13 years 11 months ago
Semantic Assistants - User-Centric Natural Language Processing Services for Desktop Clients
Today's knowledge workers have to spend a large amount of time and manual effort on creating, analyzing, and modifying textual content. While more advanced semantically-orient...
René Witte, Thomas Gitzinger
ASWC
2008
Springer
13 years 11 months ago
Semantically Conceptualizing and Annotating Tables
Abstract. Enabling a system to automatically conceptualize and annotate a human-readable table is one way to create interesting semanticweb content. But exactly "how?" is...
Stephen Lynn, David W. Embley
CCS
2008
ACM
13 years 11 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
CEAS
2008
Springer
13 years 11 months ago
Detecting Known and New Salting Tricks in Unwanted Emails
Spam and phishing emails are not only annoying to users, but are a real threat to internet communication and web economy. The fight against unwanted emails has become a cat-and-mo...
André Bergholz, Gerhard Paass, Frank Reicha...