Sciweavers

13969 search results - page 2731 / 2794
» Child computer interaction
Sort
View
IPOM
2005
Springer
15 years 9 months ago
Comprehensive Solution for Anomaly-Free BGP
The Internet consists of many self-administered and inter-connected AutonomousSystems(ASms). ASms exchangeinter-AS routing information with each other via the Border Gateway Protoc...
Ravi Musunuri, Jorge Arturo Cobb
ISI
2005
Springer
15 years 9 months ago
How Question Answering Technology Helps to Locate Malevolent Online Content
The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Coo...
Dmitri Roussinov, Jose Antonio Robles-Flores
IVA
2005
Springer
15 years 9 months ago
Direct Manipulation Like Tools for Designing Intelligent Virtual Agents
If intelligent virtual agents are to become widely adopted it is vital that they can be designed using the user friendly graphical tools that are used in other areas of graphics. H...
Marco Gillies, Dale Robeterson, Daniel Ballin
RAID
2005
Springer
15 years 9 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
SEMWEB
2005
Springer
15 years 9 months ago
RelExt: A Tool for Relation Extraction from Text in Ontology Extension
Abstract. Domain ontologies very rarely model verbs as relations holding between concepts. However, the role of the verb as a central connecting element between concepts is undenia...
Alexander Schutz, Paul Buitelaar
« Prev « First page 2731 / 2794 Last » Next »