Sciweavers

45 search results - page 8 / 9
» Creating and exploring web form repositories
Sort
View
CIKM
2003
Springer
15 years 2 months ago
Online duplicate document detection: signature reliability in a dynamic retrieval environment
As online document collections continue to expand, both on the Web and in proprietary environments, the need for duplicate detection becomes more critical. Few users wish to retri...
Jack G. Conrad, Xi S. Guo, Cindy P. Schriber
I3
2007
14 years 11 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
WSC
2008
14 years 12 months ago
Simulating culture: An experiment using a multi-user virtual environment
With increased levels of global trade, foreign policy making, foreign travel, and distance collaboration using the Internet, the issue of culture takes center stage. One needs to ...
Paul A. Fishwick, Julie Henderson, Elinore Fresh, ...
USS
2008
14 years 12 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
MM
2006
ACM
157views Multimedia» more  MM 2006»
15 years 3 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo