Sciweavers

209 search results - page 9 / 42
» Combining World Wide Web and Wireless Security
Sort
View
85
Voted
WWW
2001
ACM
15 years 10 months ago
Seeing the whole in parts: text summarization for web browsing on handheld devices
We introduce five methods for summarizing parts of Web pages on handheld devices, such as personal digital assistants (PDAs), or cellular phones. Each Web page is broken into text...
Orkut Buyukkokten, Hector Garcia-Molina, Andreas P...
MOBICOM
1997
ACM
15 years 1 months ago
Web Browsing in a Wireless Environment: Disconnected and Asynchronous Operation in ARTour Web Express
In a previous paper [elided], we described ARTour Web Express, a software system that makes it possible to run World Wide Web applications over wide-area wireless networks. Our ea...
Henry Chang, Carl D. Tait, Norman H. Cohen, Moshe ...
SIGKDD
2002
172views more  SIGKDD 2002»
14 years 9 months ago
Data Mining, National Security, Privacy and Civil Liberties
In this paper, we describe the threats to privacy that can occur through data mining and then view the privacy problem as a variation of the inference problem in databases. Keywor...
Bhavani M. Thuraisingham
IEEEHPCS
2010
14 years 8 months ago
Semantic model checking security requirements for web services
Model checking is a formal verification method widely accepted in the web service world because of its capability to reason about service behaviors, at their process-level. It ha...
L. Boaro, E. Glorio, Francesco Pagliarecci, Luca S...
MAICS
2004
14 years 11 months ago
Intelligent Content Based Title and Author Name Extraction from Formatted Documents
This paper describes the development of algorithms for extracting the title and the names of the authors from documents available on the World Wide Web. In this paper we describe ...
Eric G. Berkowitz, Mohamed Reda Elkhadiri, Tim Sah...