-
2
-
-
35348829895
-
Why we tag: Motivations for annotation in mobile and online media
-
Ames, M., Naaman, M.: Why We Tag: Motivations for Annotation in Mobile and Online Media. In: CHI 2007, pp. 971-980 (2007).
-
(2007)
CHI 2007
, pp. 971-980
-
-
Ames, M.1
Naaman, M.2
-
3
-
-
37249013395
-
Semantic web content analysis: A study in proximity-based collaborative clustering
-
Loia, V., Pedrycz, W., Senatore, S.: Semantic Web Content Analysis: A Study in Proximity- Based Collaborative Clustering. IEEE Trans. on Fuzzy Systems 15, 1294-1312 (2007).
-
(2007)
IEEE Trans. on Fuzzy Systems
, vol.15
, pp. 1294-1312
-
-
Loia, V.1
Pedrycz, W.2
Senatore, S.3
-
4
-
-
78650326300
-
-
Youtube, http://www.youtube.com.
-
Youtube
-
-
-
5
-
-
78650317949
-
-
Flickr, http://www.flickr.com/.
-
Flickr
-
-
-
6
-
-
78650340306
-
-
Myspace, http://www.myspace.com/.
-
Myspace
-
-
-
7
-
-
84886287589
-
-
Facebook, http://www.facebook.com/.
-
Facebook
-
-
-
8
-
-
33749016498
-
Information revelation and privacy in online social networks
-
Alexandria, VA, USA
-
Gross, R., Acquisti, A., John Heinz III, H.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, Alexandria, VA, USA, pp. 71-80 (2005).
-
(2005)
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society
, pp. 71-80
-
-
Gross, R.1
Acquisti, A.2
John Heinz III, H.3
-
10
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-Based Fuzzy Vault: Implementation and Performance. IEEE Transactions Information Forensics and Security 2(4), 744-757 (2007).
-
(2007)
IEEE Transactions Information Forensics and Security
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.3
-
11
-
-
50249133245
-
Fuzzy vault for face based cryptographic key generation
-
September 2007
-
Wang, Y., Plataniotis, K.N.: Fuzzy Vault for Face Based Cryptographic key Generation. In: Biometrics Symposium, September 2007, pp. 1-6 (2007).
-
(2007)
Biometrics Symposium
, pp. 1-6
-
-
Wang, Y.1
Plataniotis, K.N.2
-
12
-
-
37849013877
-
Biometric key binding: Fuzzy vault based on iris images
-
Lee, S.-W. Li, S.Z. (eds.), LNCS, Springer, Heidelberg
-
Lee, Y.J., Bae, K., Lee, S.J., Park, K.R., Kim, J.: Biometric key Binding: Fuzzy Vault Based on Iris Images. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol. 4642, pp. 800- 808. Springer, Heidelberg (2007).
-
(2007)
ICB 2007
, vol.4642
, pp. 800-808
-
-
Lee, Y.J.1
Bae, K.2
Lee, S.J.3
Park, K.R.4
Kim, J.5
-
13
-
-
68949177979
-
-
Wikipedia, List of hobbies, http://en.wikipedia.org/wiki/List-of-hobbies.
-
List of Hobbies
-
-
-
15
-
-
78650321203
-
-
Wikipedia, List of films, http://en.wikipedia.org/wiki/Lists-of-films.
-
List of Films
-
-
-
16
-
-
0003508558
-
-
November
-
NIST. Advanced Encryption Standard (AES) (November 2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
-
(2001)
Advanced Encryption Standard (AES)
-
-
-
17
-
-
0004161838
-
-
2nd edn. Cambridge University Press, Cambridge
-
Press, W.H., Teukolsky, S.A., Vetterling, W.T., Flannery, B.P.: Numerical Recipes in C, 2nd edn. Cambridge University Press, Cambridge (1992).
-
(1992)
Numerical Recipes in C
-
-
Press, W.H.1
Teukolsky, S.A.2
Vetterling, W.T.3
Flannery, B.P.4
|