Sciweavers

1014 search results - page 136 / 203
» Using Keyword Extraction for Web Site Clustering
Sort
View
CCS
2010
ACM
14 years 10 months ago
Protecting browsers from cross-origin CSS attacks
Cross-origin CSS attacks use style sheet import to steal confidential information from a victim website, hijacking a user's existing authenticated session; existing XSS defen...
Lin-Shung Huang, Zack Weinberg, Chris Evans, Colli...
JIS
2006
103views more  JIS 2006»
14 years 9 months ago
Usage patterns of collaborative tagging systems
Collaborative tagging describes the process by which many users add metadata in the form of keywords to shared content. Recently, collaborative tagging has grown in popularity on ...
Scott A. Golder, Bernardo A. Huberman
CORR
2010
Springer
194views Education» more  CORR 2010»
14 years 6 months ago
An Effective Method of Image Retrieval using Image Mining Techniques
The present research scholars are having keen interest in doing their research activities in the area of Data mining all over the world. Especially, [13]Mining Image data is the o...
A. Kannan, V. Mohan, N. Anbazhagan
AIRWEB
2009
Springer
15 years 4 months ago
Social spam detection
The popularity of social bookmarking sites has made them prime targets for spammers. Many of these systems require an administrator’s time and energy to manually filter or remo...
Benjamin Markines, Ciro Cattuto, Filippo Menczer
IADIS
2004
14 years 11 months ago
An internet-based automated virtual reality generator for pain relief
The Internet has impacted our lives in many different ways. In this paper we present an Internet-based automated virtual reality (VR) generator for pain relief of hospitalized bur...
Yingcai Xiao, Michael Tipton