Filters








3,768 Hits in 2.9 sec

A Multilingual Electronic Text Collection of Folk Tales for Casual Users Using Off-the-Shelf Browsers

Myriam Dartois, Akira Maeda, Tetsuo Sakaguchi, Takehisa Fujita, Shigeo Sugimoto, Koichi Tabata
1997 D-Lib Magazine  
The MHTML browser system is composed of two components, MHTML server and MHTML viewer applet.  ...  In some cases there are several variants of a tale which differ region by region, or even village by village. Thus, folk tale is an important part of culture of a nation, a region or a village.  ... 
doi:10.1045/october97-sugimoto fatcat:5nfux57q5ndcdi6cjnsx2l63ju

Page 129 of Journal of Advertising Research Vol. 47, Issue 1 [page]

2007 Journal of Advertising Research  
A Tale of Two Campaigns MANFRED SCHWAIGER, CARSTEN RENNHAK, CHARLES R. TAYLOR, and HUGH M. CANNON Until recently, comparative advertising was legally prohibited in Germany.  ...  Testing of the effectiveness of two comparative advertising campaigns, one relying on an informative appeal and the other on an emotional appeal, finds that the comparative campaign relying on information  ... 

Urban Sound Tales: The Invisible Landscapes – the Sonic Past of the Two Cities

Tak-Cheung Hui, Shihong Ren
2022 Zenodo  
In a web browser, audience is allowed to explore and customize a soundscape by manipulating the provided user interface.  ...  Four different audio-visual scenes based on the real life of two Asian cities are prepared into interactive programs, including recorded sound samples, photos and videos.  ...  ACKNOWLEDGMENTS We would like to express our special thanks to the photographer Sean Wang, the video creator Chon Ip, and TimeArt Studio for the realization of the work.  ... 
doi:10.5281/zenodo.6769891 fatcat:3o4z24ts3jcybfrahytvy3p7wu

Page 515 of Current Opinion Vol. 37, Issue 5 [page]

1904 Current Opinion  
Two other books must also be mentioned. The first is ‘“‘Red Cap Tales,” Copyright, 1904, by A. C. McClurg & Co. by the ever-popular S. R. DECORATION FROM ‘‘ FARMINGTON”  ...  Half a dozen or more tales are given from each book.  ... 

When PIDs aren't there. Tales from Crossref Event Data [article]

Joe Wass
2016 Figshare  
Crossref Event Data (CED) tracks the use of scholarly publications across the web. We use PIDs to reference publications. In some places, like Wikipedia, PIDs are a commonplace sight.  ...  How do we track publications on platforms that don't encourage the use of PIDs? Hear examples, methods, success and horror stories as well as our plans for CED.  ...  a browser • Destination URL • where a theoretical person ends up clicking a theoretical DOI Do we need to use the browser?  ... 
doi:10.6084/m9.figshare.4220580 fatcat:boytvfwu7zhrxfzb7go3rxa3ia

The Nun's Priest's Tale on CD-ROM (review)

Stephen R. Reimer
2009 Journal of English and Germanic Philology  
Perhaps a Breton lai-a fairy tale-affords possibilities for utopian thought outside of patriarchal constraints less available in the dramatic monologue that typically operates in the domain of social discourse  ...  Perhaps it is unfair to ask for more of two such perspicacious, intelligent, and far-ranging studies.  ...  For someone with a lifetime or two to dedicate to the study of the variants in the Nun's Priest's Tale, this is the CD to buy.  ... 
doi:10.1353/egp.0.0005 fatcat:ibkfvnecmvaq3ngx3mwd2vdj6e

Oregon Trails--Anatomy of a Collection

Thomas W. Leonhardt
2015 Against the Grain  
Sailors have their own language, too, and I was delighted to find a dictionary, A Sea of Words: A Lexicon and Companion to the Complete Seafaring Tales of Patrick O'Brian, by Dean King that works equally  ...  Browser Wars 2015 Catch-Up: Web metrics are everything and nothing. Facebook counts over one billion users, one-seventh of the known world population. This means a NASDAQ valuation of 80.00 a share.  ...  Jacobs , it is probably because of his eerie tale, "The Monkey's Paw," a story that has been dramatized for radio and television, neither medium of which can capture the horror of the written story, especially  ... 
doi:10.7771/2380-176x.7112 fatcat:ktxt4egvkbhlheczabgx735oe4

Page 247 of Overland Monthly and Out West Magazine Vol. 88, Issue 8 [page]

1930 Overland Monthly and Out West Magazine  
“It’s not a tale, only a wee bit of childish experience,” laughed the Hostess.  ...  Like a child in a strange garden he watched the month of thrushes raise her house of green wattles.’” *“Where’s the Artist tonight?” asked the Browser later.  ... 

Hoxa1 and TALE proteins display cross-regulatory interactions and form a combinatorial binding code on Hoxa1 targets [article]

Bony De Kumar, Hugo J Parker, Ariel Paulson, Mark E Parrish, Irina Pushel, Brian D Slaughter, Jay R Unruh, Julia B Zeitlinger, Robb Krumlauf
2016 bioRxiv   pre-print
The combinatorial binding patterns of TALE proteins defines distinct classes of Hoxa1 targets and indicates a role as cofactors in modulating the specificity of Hox proteins.  ...  Pbx and Meis are members of the TALE family and genome-wide analysis of multiple TALE members (Pbx, Meis, TGIF, Prep1 and Prep2) show that nearly all Hoxa1 targets display occupancy of one or more TALE  ...  This work was performed to fulfill, in part, requirements for IRP Ph.D. thesis research as a student registered in the Stowers Institute Graduate Program.  ... 
doi:10.1101/092296 fatcat:squbp6wffrguzduvuhbgorbqay

A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web

Stefano Calzavara, Sebastian Roth, Alvise Rabitti, Michael Backes, Ben Stock
2020 USENIX Security Symposium  
We thus propose recommendations for web developers and browser vendors to mitigate this issue. Finally, we design and implement a server-side proxy to retrofit security in web applications.  ...  Our analysis shows that 10% of the (distinct) framing control policies in the wild are inconsistent and most often do not provide any level of protection to at least one browser.  ...  Acknowledgements We would like to thank the reviewers for their advices on how to improve the presentation of our paper.  ... 
dblp:conf/uss/CalzavaraRR0S20 fatcat:p6snbuupm5a4jhuryjtl6as3la

Publishing computational research – A review of infrastructures for reproducible and transparent scholarly communication [article]

Markus Konkol, Daniel Nüst, Laura Goulier
2020 arXiv   pre-print
The key contribution of this paper is a review of applications addressing the issue of publishing executable computational research results.  ...  In addition, the author guidelines of scientific journals and conferences more often include a statement on data availability, and some reviewers reject unreproducible submissions.  ...  The authors of this paper are members of the o2r project that was also discussed in this paper (http://o2r. info/).  ... 
arXiv:2001.00484v1 fatcat:4nm6pmwzhvgptmcfhbkp7efvky

Experiments of Entertainment Applications of a Virtual World System for Mobile Phones [chapter]

Hiroyuki Tarumi, Kasumi Nishihara, Kazuya Matsubara, Yuuki Mizukubo, Shouji Nishimoto, Fusako Kusunoki
2005 Lecture Notes in Computer Science  
The game follows a Japanese famous tale and a player plays as the hero. We recruited twenty subjects and they played it 35 minutes in average.  ...  Using a virtual world system for GPS-phones, we have developed a small RPG-like game to give information to tourists.  ...  Acknowledgments Part of the research was supported by Kagawa Industry Support Foundation (Grant for Industry-Academia-Government Liaison for Research and Development) and the Okawa Foundation.  ... 
doi:10.1007/11558651_37 fatcat:edlord6hljhk7gc2hfzygxpjfe

Cut-&-Paste Attacks with JAVA [chapter]

Serge Lefranc, David Naccache
2003 Lecture Notes in Computer Science  
This paper describes malicious applets that use Java's sophisticated graphic features to rectify the browser's padlock area and cover the address bar with a false https domain name.  ...  the inclusion of an applet in the attacker's web page.  ...  Besides the site-specific information displayed by a website to a user (contents that one can trust or not), secure sessions has two visual tell-tale signs: -The image of a closed padlock appears in the  ... 
doi:10.1007/3-540-36552-4_1 fatcat:nkrqzs32svdvjdtdjcmjkwoaom

CNNs for NLP in the Browser: Client-Side Deployment and Visualization Opportunities

Yiyun Liang, Zhucheng Tu, Laetitia Huang, Jimmy Lin
2018 Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Demonstrations  
We demonstrate a JavaScript implementation of a convolutional neural network that performs feedforward inference completely in the browser.  ...  Our evaluations show the feasibility of JavaScript as a deployment target.  ...  Future Work and Conclusions We describe a JavaScript implementation of a convolutional neural network that runs completely in the browser.  ... 
doi:10.18653/v1/n18-5013 dblp:conf/naacl/LiangTHL18 fatcat:mnv54bngrzfs7kc6ym6xxylopm

Language support for extensible web browsers

Benjamin S. Lerner, Dan Grossman
2010 Proceedings of the 2010 Workshop on Analysis and Programming Languages for Web Applications and Cloud Applications - APLWACA '10  
We illustrate this position by contrasting the extension mechanisms of the two predominant extensible browsers, Mozilla Firefox and Google Chrome, and highlighting their weaknesses.  ...  Web browsers are sophisticated and crucial programs, and millions of users extend their browsers to customize their browsing experience.  ...  We have sketched the essential features of two browser extension systems, and identified key strengths and flaws of each.  ... 
doi:10.1145/1810139.1810146 fatcat:whcgb2kg7fccpobm5zvsiv37b4
« Previous Showing results 1 — 15 out of 3,768 results