Sciweavers

5009 search results - page 927 / 1002
» Mapping Human Networks
Sort
View
HAIS
2010
Springer
15 years 2 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
IFIP
2010
Springer
15 years 2 months ago
Laban Movement Analysis towards Behavior Patterns
This work presents a study about the use of Laban Movement Analysis (LMA) as a robust tool to describe human basic behavior patterns, to be applied in human-machine interaction. LM...
Luís Santos, Jorge Dias
MM
2009
ACM
147views Multimedia» more  MM 2009»
15 years 2 months ago
Wearing a YouTube hat: directors, comedians, gurus, and user aggregated behavior
While existing studies on YouTube’s massive user-generated video content have mostly focused on the analysis of videos, their characteristics, and network properties, little att...
Joan-Isaac Biel, Daniel Gatica-Perez
MM
2009
ACM
133views Multimedia» more  MM 2009»
15 years 2 months ago
Friend recommendation according to appearances on photos
Unlike the questionnaire based friend recommendation scheme used in Social Network Service (SNS) websites nowadays (e.g. online dating sites, online matchmaking sites), we focus o...
Zhipeng Wu, Shuqiang Jiang, Qingming Huang
CTRSA
2001
Springer
122views Cryptology» more  CTRSA 2001»
15 years 2 months ago
Password Authentication Using Multiple Servers
Safe long-term storage of user private keys is a problem in client/server systems. The problem can be addressed with a roaming system that retrieves keys on demand from remote cred...
David P. Jablon