Sciweavers

1639 search results - page 259 / 328
» internet 2006
Sort
View
SIGMOD
2006
ACM
214views Database» more  SIGMOD 2006»
16 years 16 hour ago
aAqua: a database-backended multilingual, multimedia community forum
aAQUA is an online multilingual, multimedia Agricultural portal for disseminating information from and to rural communities. It answers farmers' queries based on the location...
Krithi Ramamritham, Anil Bahuman, Subhasri Duttagu...
PERCOM
2006
ACM
15 years 11 months ago
Is Your Cat Infected with a Computer Virus?
RFID systems as a whole are often treated with suspicion, but the input data received from individual RFID tags is implicitly trusted. RFID attacks are currently conceived as prop...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
ICDM
2008
IEEE
106views Data Mining» more  ICDM 2008»
15 years 6 months ago
Metropolis Algorithms for Representative Subgraph Sampling
While data mining in chemoinformatics studied graph data with dozens of nodes, systems biology and the Internet are now generating graph data with thousands and millions of nodes....
Christian Hübler, Hans-Peter Kriegel, Karsten...
ESWS
2007
Springer
15 years 6 months ago
Media, Politics and the Semantic Web
The media play an important role in the functioning of our society. This role is extensively studied by Communication Scientists, requiring a systematic analysis of media content. ...
Wouter van Atteveldt, Stefan Schlobach, Frank van ...
ACSAC
2006
IEEE
15 years 6 months ago
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy
In this paper we examine the problem of entering sensitive data, such as passwords, from an untrusted machine. By untrusted we mean that it is suspected to be infected with spywar...
Dinei A. F. Florêncio, Cormac Herley