Sciweavers

192 search results - page 10 / 39
» Who gets spammed
Sort
View
BIOSIG
2009
177views Biometrics» more  BIOSIG 2009»
13 years 5 months ago
Classification of Skin Diseases and Their Impact on Fingerprint Recognition
Abstract: This article describes different skin diseases which could have the influence to the process of fingerprint acquirement. There are many people, who suffer under such dise...
Martin Drahanský, Eva Brezinova, Filip Ors&...
DBSEC
2003
137views Database» more  DBSEC 2003»
13 years 8 months ago
Certifying Data from Multiple Sources
Abstract Data integrity can be problematic when integrating and organizing information from many sources. In this paper we describe efficient mechanisms that enable a group of data...
Glen Nuckolls, Charles U. Martel, Stuart G. Stubbl...
JCS
2010
135views more  JCS 2010»
13 years 6 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
CSCW
2012
ACM
12 years 3 months ago
Friends, romans, countrymen: lend me your URLs. using social chatter to personalize web search
People often find useful content on the web via social media. However, it is difficult to manually aggregate the information and recommendations embedded in a torrent of social ...
Abhinay Nagpal, Sudheendra Hangal, Rifat Reza Joye...
NSDI
2008
13 years 9 months ago
Ostra: Leveraging Trust to Thwart Unwanted Communication
Online communication media such as email, instant messaging, bulletin boards, voice-over-IP, and social networking sites allow any sender to reach potentially millions of users at...
Alan Mislove, Ansley Post, Peter Druschel, P. Kris...