Sciweavers

1156 search results - page 191 / 232
» Web Service Authorization Framework
Sort
View
CIKM
2011
Springer
13 years 11 months ago
Content-driven detection of campaigns in social media
We study the problem of detecting coordinated free text campaigns in large-scale social media. These campaigns – ranging from coordinated spam messages to promotional and advert...
Kyumin Lee, James Caverlee, Zhiyuan Cheng, Daniel ...
WWW
2001
ACM
16 years 14 days ago
Effective Web data extraction with standard XML technologies
We discuss the problem of Web data extraction and describe an XML-based methodology whose goal extends far beyond simple "screen scraping." An ideal data extraction proc...
Jussi Myllymaki
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
15 years 6 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...
DOCENG
2007
ACM
15 years 3 months ago
A model for mapping between printed and digital document instances
The first steps towards bridging the paper-digital divide have been achieved with the development of a range of technologies that allow printed documents to be linked to digital c...
Nadir Weibel, Moira C. Norrie, Beat Signer
OTM
2005
Springer
15 years 5 months ago
Registering a Business Collaboration Model in Multiple Business Environments
Today business registries are regarded as means of finding services offered by a business partner. However, business registries might also serve as means of seaching inter-organiza...
Birgit Hofreiter, Christian Huemer