78 Hits in 3.2 sec

Using CAPTCHAs to Index Cultural Artifacts [chapter]

Qiang Zhu, Eamonn Keogh
2010 Lecture Notes in Computer Science  
In this work we show that we can use CAPTCHAs, puzzles designed to tell humans and computers apart, to segment and index rock art.  ...  Rock art, human-made markings on stone, is an important cultural artifact and the earliest expression of abstract thinking.  ...  We would like to thank the many donors of datasets, particularly Dr. Robert Mark and Evelyn Billo of  ... 
doi:10.1007/978-3-642-13062-5_23 fatcat:rxbyuwacbbfhfmjtyjcw7nglea

Attacks and design of image recognition CAPTCHAs

Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Liu, Ning Xu, Meng Yi, Kaiwei Cai
2010 Proceedings of the 17th ACM conference on Computer and communications security - CCS '10  
We first review and examine all IRCs schemes known to us and evaluate each scheme against the practical requirements in CAPTCHA applications, particularly in large-scale real-life applications such as  ...  An infinite number of types of objects can be used to generate challenges, which can effectively disable the learning process in machine learning attacks.  ...  The CAPTCHA asks a user to pick three hot people from nine photos of people presented to the user. Whether a person is hot or not is subjective and culture-dependent.  ... 
doi:10.1145/1866307.1866329 dblp:conf/ccs/ZhuYLYLXYC10 fatcat:u5dkkmh3h5gdxkpnkceeqfh3hy

MOVTCHA: A CAPTCHA Based on Human Cognitive and Behavioral Features Analysis [chapter]

Asadullah Al Galib, Reihaneh Safavi-Naini
2015 Lecture Notes in Computer Science  
We refer to this Captcha as Movtcha (Matching Objects by Visual Search To Tell Computers and Humans Apart).  ...  Movtcha, unlike other Captchas, surpasses language and experience barriers by presenting both challenge and response in clear form and therefore can be used by people all across the world.  ...  Another challenge while designing Captchas which is seldom explored, is the issue of Captcha being language, culture or experience dependent.  ... 
doi:10.1007/978-3-319-21966-0_21 fatcat:e2lmlkwdhjclpdk6erb7lxth6u

An efficient and effective similarity measure to enable data mining of petroglyphs

Qiang Zhu, Xiaoyue Wang, Eamonn Keogh, Sang-Hee Lee
2010 Data mining and knowledge discovery  
It is believed that there are millions of petroglyphs in North America alone, and the study of this valued cultural resource has implications even beyond anthropology and history.  ...  We would like to thank the many donors of datasets, particularly Dr. Robert Mark and Evelyn Billo of, Taryn T.  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction in any medium, provided  ... 
doi:10.1007/s10618-010-0200-z fatcat:gunz52hutvhgxptt4rzspm6kqi

Cross-Cultural Analysis of Social Network Services in Japan, Korea, and the USA [chapter]

Aaron Marcus, Niranjan Krishnamurthi
2009 Lecture Notes in Computer Science  
The techniques of cross-cultural analysis of Websites based on culture models are used to examine user-interface components (the metaphors, mental models, navigation, interaction, and appearance) of social  ...  The authors note and evaluate patterns of similarity and difference in the Website designs that seem to link social networking sites by culture dimensions.  ...  While this paper provides some insights into apparent cultural differences in SNSs, more research needs to be done to obtain a clearer picture of the cultural artifacts involved in the different SNS sites  ... 
doi:10.1007/978-3-642-02767-3_7 fatcat:isccq6mglffunfqi7b37w6p5ga

Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk vs. Freelancer [chapter]

Vaibhav Garg, L. Jean Camp, Chris Kanich
2013 The Economics of Information Security and Privacy  
Some hypotheses appear to hold, e.g.  ...  One finding relevant to policymaking is that deterring bidders in crowd-sourced labor markets is an ineffective approach to decreasing demand and in turn market size.  ...  Acknowledgements We would like to thank Prof. Panagiotis G. Ipeirotis who made the demographic data publicly available. We also thank Prof.  ... 
doi:10.1007/978-3-642-39498-0_13 fatcat:ml5pwoqfvncm7m5agojinjrtje

An overview of the NFAIS conference: Blockchain for scholarly publishing

Bonnie Lawlor, Bonnie Lawlor
2018 Information Services and Use  
It was established as a reliable record-keeping tool and became an integral part of the business culture, but it also allowed financial institutions to become powerful middlemen in global finances -something  ...  Moving forward, it is likely that blockchains will be another tool that can be used to solve newer sets of problems... Blockchain technologies have the power to disrupt many industries.  ...  Perhaps the most important pearl of wisdom is that of which Jason Griffey reminded us -Amara's Law: "We tend to overestimate the effect of a technology in the short run and underestimate the effect in  ... 
doi:10.3233/isu-180015 fatcat:2x3i433zwzbarfrlr7pfac7t5e

Image retrieval

Ritendra Datta, Dhiraj Joshi, Jia Li, James Z. Wang
2008 ACM Computing Surveys  
We also discuss significant challenges involved in the adaptation of existing image retrieval techniques to build systems that can be useful in the real-world.  ...  While the last decade laid foundation to such promise, it also paved the way for a large number of new techniques and systems, got many new people involved, and triggered stronger association of weakly  ...  Hence, digital representation of cultural artifacts and pictures is bound to increase their popularity.  ... 
doi:10.1145/1348246.1348248 fatcat:5jbcrsxkkbac5cya3zb7eb22ea

A volunteered geographic information system for collecting and rating petroglyph data

Vincenzo Deufemia, Viviana Mascardi, Luca Paolino, Giuseppe Polese, Henry de Lumley
2014 Journal of Visual Languages and Computing  
The system exploits a rewarding strategy to stimulate people participation to the project, so that those entering useful information gain free archeological data, tips on excursions and tours, opinions  ...  empower the work of the archeologists, enabling them to tackle technology shortfalls.  ...  CAPTCHA-ROCK is a system for helping archeologists to extract data from petroglyph images [10] .  ... 
doi:10.1016/j.jvlc.2014.10.031 fatcat:b73y4atcxre2riixydft5pbaia

Distant Approaches to the Printed Page

James Dobson, Scott Sanders
2022 Digital Studies  
However, segmenting a text into paragraphs rids us of information about the appearance of the paragraph and its relation to the rest of the page remains occluded.  ...  The most common category of this text segmentation procedure is natural to literary scholars: the separation of individual works from within a larger collection of texts.  ...  To that end, we have experimented with a productive form of "distant" and "close reading" that allows us to contextualize print artifacts.  ... 
doi:10.16995/dscn.8107 fatcat:jcrcc66acrhghd7qwjkrf7ykuq

The Three 'W' of the World Wide Web Call for the Three 'M' of a Massively Multidisciplinary Methodology [chapter]

Fabien Gandon
2015 Lecture Notes in Business Information Processing  
This position paper defends the idea that the development of the Web to its full potential requires addressing the challenge of massive multidisciplinarity.  ...  The Web can create problems and at the same sometime providenew solutions.The collaborative landscape the Web can be used to support new co-design and crossfertilization to help us achieve this Massively  ...  Acknowledgments: I would like to thank Catherine Faron-Zucker and Alexandre Monnin for their reviews of the article and the changes and references they suggested.  ... 
doi:10.1007/978-3-319-27030-2_1 fatcat:j67tgh26vrawbnsfq6uevtlrti

Big? Smart? Clean? Messy? Data In The Humanities

Christof Schöch
2014 Zenodo  
Most of my colleagues in literary and cultural studies would not necessarily speak of their objects of study as "data."  ...  The digital humanities aim to raise to the challenge and realize the potential of this data for humanistic inquiry.  ...  Whether we are historians using texts or other cultural artifacts as windows into another time or another culture, or whether we are literary scholars using knowledge of other times and cultures in order  ... 
doi:10.5281/zenodo.8432 fatcat:z4ajh52bozfazjvgzyfpt6ieei

Towards a Marketplace of Visual Elements for Notation Design

Dirk van der Linden, Irit Hadar, Anna Zamansky
2016 2016 IEEE 24th International Requirements Engineering Conference (RE)  
Please cite only the published version using the reference above.  ...  Full terms of use are available: Abstract-New visual languages and extensions of existing notations are increasingly introduced for various purposes.  ...  Nonetheless, there can be many cultural and personal specific differences in what connotations users have of particular colors, or combinations, which make it important to tailor color use to particular  ... 
doi:10.1109/re.2016.31 dblp:conf/re/LindenHZ16 fatcat:ubcjokpmg5ea3ctudvle6gexgy

Barriers to collaborative information seeking in organizations

Arvind Karunakaran, Madhu Reddy
2012 Proceedings of the American Society for Information Science and Technology  
In this study, we used Mechanical Turk (MTurk) to gather data from 307 participants to understand the barriers to CIS in organizations.  ...  Although researchers are starting to identify various activities and mechanisms that underlie CIS, we know very little about the barriers to CIS.  ...  Third, we used CAPTCHA at the end of the survey to eliminate 'spammers' and 'bots'. Data Analysis We collected responses from 307 participants.  ... 
doi:10.1002/meet.14504901169 fatcat:u5rnnn4xpzdcvm24lzpvgisige

Cybercrime threat intelligence: A systematic multi-vocal literature review

Giuseppe Cascavilla, Damian A. Tamburri, Willem-Jan Van Den Heuvel
2021 Computers & security  
should strive to fill this gap with more and more advanced degrees of anonymity to grant protection to LEAs during their investigations. c o m p u t e r s & s e c u r i t y 1 0 5 ( 2 0 2 1 ) 1 0 2 2 5  ...  Cybersecurity (LEAs) should cover these features with appropriate technologies to aid in the investigative processes; (iii) what (limited) degree of anonymity is possible when crawling in Deep-, Dark-Web-researchers  ...  and cumbersome captcha solving.  ... 
doi:10.1016/j.cose.2021.102258 fatcat:43fk6zb6k5fx5jtj5a24bu3afi
« Previous Showing results 1 — 15 out of 78 results