Sciweavers

45 search results - page 8 / 9
» Creating and exploring web form repositories
Sort
View
CIKM
2003
Springer
13 years 10 months ago
Online duplicate document detection: signature reliability in a dynamic retrieval environment
As online document collections continue to expand, both on the Web and in proprietary environments, the need for duplicate detection becomes more critical. Few users wish to retri...
Jack G. Conrad, Xi S. Guo, Cindy P. Schriber
I3
2007
13 years 6 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
WSC
2008
13 years 7 months ago
Simulating culture: An experiment using a multi-user virtual environment
With increased levels of global trade, foreign policy making, foreign travel, and distance collaboration using the Internet, the issue of culture takes center stage. One needs to ...
Paul A. Fishwick, Julie Henderson, Elinore Fresh, ...
USS
2008
13 years 7 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
MM
2006
ACM
157views Multimedia» more  MM 2006»
13 years 11 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo