Filters








550 Hits in 5.3 sec

Stealing Anchors to Link the Wiki [chapter]

Philipp Dopichaj, Andre Skusa, Andreas Heß
2009 Lecture Notes in Computer Science  
This paper describes the Link-the-Wiki submission of Lycos Europe. We try to learn suitable anchor texts by looking at the anchor texts the Wikipedia authors used.  ...  Disambiguation is done by using textual similarity and also by checking whether a set of link targets "makes sense" together.  ...  The authors are solely responsible for the contents of this work. We thank our colleagues at Lycos Europe who gave valuable feedback.  ... 
doi:10.1007/978-3-642-03761-0_35 fatcat:edkm2bzxlrgnphfeoqt7kcexzi

Microformats: the next (small) thing on the semantic Web?

R. Khare
2006 IEEE Internet Computing  
Thinking about Linking "If one Web site links to another, the link doesn't carry any information about why the sites are linked. But what if it did?"  ...  hCard How-To Continuing in a practical vein, let's deconstruct the hCard microformat (www.microformats.org/wiki/ hcard).  ... 
doi:10.1109/mic.2006.13 fatcat:aibwg3gvnfchrikacz6tumhdnq

Identity Management and Control for Clouds [chapter]

Raghu Yeluri, Enrique Castro-Leon
2014 Building the Infrastructure for Cloud Security  
The other foundational pillar to enable them is identity management, and that is the focus on this chapter.  ...  In the last few chapters we covered the technologies, usage models, and capabilities that are required to enable trusted infrastructure in the cloud-one of the foundation pillars for trusted clouds.  ...  Technology advances make it practical to build wireless selfcontained sensors that link directly to the Internet, feeding databases that analyze and infer new knowledge about the world.  ... 
doi:10.1007/978-1-4302-6146-9_7 fatcat:7rqnbfyfxbhrdkh2zgnfeupihy

A Self-Supervised Approach to Comment Spam Detection Based on Content Analysis

A. Bhattarai, D. Dasgupta
2011 International Journal of Information Security and Privacy  
Compared to existing solutions, our approach demonstrates to be more flexible and adaptable to the environment as it requires minimal human intervention.  ...  The preliminary evaluation of the proposed spam detection system shows promising results and we hope to experiment with larger dataset in the future.  ...  NUMBER OF ANCHOR TEXTS The text that appears in HTML between <a...> and </a> tags are referred to as anchor texts.  ... 
doi:10.4018/jisp.2011010102 fatcat:635zknj5ifgrzatcqf234sdciu

The Devil in Latvian Charms and Related Genres

Aigars Lielbārdis
2019 Acta Ethnographica Hungarica  
These legends and beliefs help us understand the similarities expressed in the charms, deepen and expand the semantics of the images, and explain the associative links and anchoring of specific actions  ...  The Devil's activities and presence are linked with the origins of evil and associated with a variety of diseases which, like the Devil himself, are overcome by similar techniques.  ...  I steal, I steal! Through the fence, through the fence sections, to the red rock! There you will be struck by lightning, nine fathoms into the ground.]  ... 
doi:10.1556/022.2019.64.2.10 fatcat:ou7xqn3xrbamtdjyoyvqka4mxu

Towards using UAV for improving 5G cellular communication systems

Mohamed El Sayed Kotb, Wagdy R. Anis, Ahmed A. Abd-Elhafez
2021 Indonesian Journal of Electrical Engineering and Computer Science  
In this integration, UAVs play the function of cellular flying customers, and are hence referred to as cellularly linked UAVs (a.k.a. UAVUE, drone-UE, 5G-connected drone, or aerial user).  ...  The UAV environment can be used to improve UAV communications in various ways.  ...  This flying platform is vulnerable to cyber-physical attacks aimed at stealing, inspecting, and abusing UAV payload details by reprogramming it to do undesirable actions.  ... 
doi:10.11591/ijeecs.v23.i1.pp265-272 fatcat:o2a7wrrtkrcjjkw53kqhn35wk4

Collaboratory Digital Libraries For Humanities In The Italian Context

Andrea Zanni, Anna Maria Tammaro
2010 Zenodo  
Thus, understanding perception of scholars towards collaboration, especially online, and comprehending if wiki systems could be the framework of collaboration were the objectives of the study.  ...  The study investigates the approach to collaboration in Humanities, within the Italian context, to test the possibility of collaborative digital library for scholars.  ...  Thus, there is a deep link between a wiki and his community: one can't live without the other.  ... 
doi:10.5281/zenodo.6754 fatcat:2w6prg2jmneonjqxgdw5bixo7i

Summarization using Wikipedia

Shu Gong, Youli Qu, Shengfeng Tian
2010 Text Analysis Conference  
Summarization utilizes the processing speed of computer to provide a concise and comprehensive glance at the data mass.  ...  We make use of Wikipedia, currently the world's largest online encyclopedia, to catch the semantic meaning under words.  ...  ACKNOWLEDGMENT This work is partially supported by National Natural Science Foundation of China (10871019/a0107) and the Key Project of Chinese Ministry of Education(108126).  ... 
dblp:conf/tac/GongQT10 fatcat:cfjspao7jzde7jxnvujs72u24u

Diversionary comments under political blog posts

Jing Wang, Clement T. Yu, Philip S. Yu, Bing Liu, Weiyi Meng
2012 Proceedings of the 21st ACM international conference on Information and knowledge management - CIKM '12  
The purpose is to distract readers from the original topic and draw attention to a new topic.  ...  To the best of our knowledge, the problem of detecting diversionary comments has not been studied so far.  ...  This action tries to steal the public's attention from defense spending to social security spending.  ... 
doi:10.1145/2396761.2398518 dblp:conf/cikm/WangYYLM12 fatcat:mm3dr62sdvfy3ord75hoxf5hr4

Phishing Detection Using Machine Learning Techniques [article]

Vahid Shahrivari, Mohammad Mahdi Darabi, Mohammad Izadi
2020 arXiv   pre-print
Phishers try to deceive their victims by social engineering or creating mock-up websites to steal information such as account ID, username, password from individuals and organizations.  ...  The Internet has become an indispensable part of our life, However, It also has provided opportunities to anonymously perform malicious activities like Phishing.  ...  on the Phishing detection, which also helped us in doing a lot of research and we came to know about so many new things we are really thankful to them.  ... 
arXiv:2009.11116v1 fatcat:ne2bu2l3ije7fixioyynp6jcl4

Detecting splogs via temporal dynamics using self-similarity analysis

Yu-Ru Lin, Hari Sundaram, Yun Chi, Junichi Tatemura, Belle L. Tseng
2008 ACM Transactions on the Web  
(a) We represent the blog temporal dynamics using selfsimilarity matrices defined on the histogram intersection similarity measure of the time, content, and link attributes of posts, to investigate the  ...  The splog detection problem is made difficult due to the lack of stable content descriptors.  ...  Comment spam is an unsolicited message added to editable Web pages such as blogs, wikis, and guestbooks.  ... 
doi:10.1145/1326561.1326565 fatcat:tyh5objdjvdinni3l5ansuxcwu

Mechanisms of ensuring security in Keystone service

Ievgeniia Kuzminykh, Maryna Fliustikova
2019 Problemi telekomunìkacìj  
For more information refer to OpenStack wiki [39].  ...  In order to avoid the pitfalls of adapting to new version, infrastructure managers may prefer reinstallation and redeployment of the cloud infrastructure.  ...  The pattern of intrusion differs slightly from a standard network attack, as the points of entry tend to be linked to gaps or unprotected access in cloud services.  ... 
doi:10.30837/pt.2019.2.06 fatcat:4kebipgsb5cbzncj5itgi4a6ym

Curriculum redesign as a faculty-centred approach to plagiarism reduction

Sue Hrasky, David Kronenberg
2011 International Journal for Educational Integrity  
A key component of this approach relates to assessment design, which is the key focus of this paper.  ...  that might be pertinent if the plagiarism response is to become a holistic one, in which all involved bear some responsibility.  ...  These items were drawn from CSHE's (2002) list of strategies to minimise plagiarism, a link to which is provided on the University of Tasmania's web page of staff resources regarding academic integrity  ... 
doi:10.21913/ijei.v7i2.761 fatcat:2v2puzp4bbgiblvi6v66zytkke

Not a Stitch out of Place: Assessing Students' Attitudes Towards Multimodal Composition

Jeanne Law Bohannon
2015 Bellaterra Journal of Teaching & Learning Language & Literature  
It frames writing instruction through the theoretical lens of democratic pedagogy and presents the works of key composition scholars.  ...  The author draws conclusions about the effectiveness of multimodal composition based on students' responses and provides supplemental information on the types of assignments and examples of student work  ...  want to borrow, share, cite, or even steal."  ... 
doi:10.5565/rev/jtl3.631 fatcat:clhbxa3iebdzvphtt72gw2stqy

Stealing or Steeling the Image? The failed branding of the Guerrillero Heroico image of Che Guevara

Maria-Carolina Cambre
2012 Imaginations: Journal of Cross-Cultural Media Studies  
The "stealing" of this image, allows it to both participate in salient conversations, and add its own intonation.  ...  bring to mind any one product, but we would also have genericide in terms of its inability to consistently link to one idea.  ... 
doi:10.17742/image.stealimage.3-1.8 fatcat:7h7uebboqjczvgbd76v6btej34
« Previous Showing results 1 — 15 out of 550 results