Results 31 to 40 of about 267 (75)

Security Challenges from Abuse of Cloud Service Threat [PDF]

open access: yes, 2019
Cloud computing is an ever-growing technology that leverages dynamic and versatile provision of computational resources and services. In spite of countless benefits that cloud service has to offer, there is always a security concern for new threats and ...
Ahmad, Ishrat, Bakht, Humayun
core  

Plataforma de Televisió Local per IP [PDF]

open access: yes, 2008
L’objectiu d’aquest projecte és desenvolupar una pàgina web que serveixi en el futur de plataforma per una televisió local. Es pretèn aconseguir gestionar la pàgina desde la mateixa web, podent canviar els continguts desde l’administrador amb facilitat ...
Barreña Lisón, Félix   +1 more
core  

Archival tool for the Discord communications platform [PDF]

open access: yes, 2022
Discord je populární chatovací platforma která v současnosti neumožňuje uživatelům exportovat všechna data, ke kterým mají přístup. Možnost tvořit zálohy online dat je důležitá jak pro osobní důvody, tak za účelem umožnění dlouhodobého uchovávání dat ...
David Labský
core  

PageRank optimization applied to spam detection

open access: yes, 2012
We give a new link spam detection and PageRank demotion algorithm called MaxRank. Like TrustRank and AntiTrustRank, it starts with a seed of hand-picked trusted and spam pages.
Fercoq, Olivier
core   +1 more source

Recuperación de información Web: 10 años de cibermetría [PDF]

open access: yes, 2008
The objective of this communication is to make a review of the evolution, in the last 10 years, in the field of the Web information retrieval. With the implantation of the different cybermetrics techniques the evolution from the studies of the Web has ...
Alonso Berrocal, José Luis   +2 more
core   +2 more sources

Corporate Appropriation of Participatory Culture [PDF]

open access: yes, 2008
Reportedly, there currently are more than one billion internet users, with two billion users expected by 2011 (out of a projected world population of seven billion around that time).
Deuze, Mark
core  

지리적 거리 정보를 활용한 가짜 팔로워 구매자 식별 방법 [PDF]

open access: yes, 2019
학위논문 (박사)-- 서울대학교 대학원 : 공과대학 컴퓨터공학부, 2019. 2. 김종권.The reputation of social media such as Twitter, Facebook, and Instagram now regard as one persons power in real-world. The person who has more friends or followers can influence more individuals.
장보연
core  

Copyright in an Era of Information Overload: Toward the Privileging of Categorizers [PDF]

open access: yes, 2007
Environmental laws are designed to reduce negative externalities (such as pollution) that harm the natural environment. Copyright law should adjust the rights of content creators in order to compensate for the ways they reduce the usefulness of the ...
Pasquale, Frank
core   +2 more sources

Search engine and optimization [PDF]

open access: yes, 2011
A relevância do Search Engine Optimization (SEO), traduzindo para Português “Optimização de Sites para Motores de Pesquisa”, hoje em dia revela-se um tema muito importante para quem pretende ter um site atraente, com muitas visitas e mais tráfego ...
Costa, Francisco Miguel de Sá Pereira
core  

Machine Learning Techniques For Detecting Untrusted Pages on the Web [PDF]

open access: yes, 2009
The Web is both an excellent medium for sharing information, as well as an attractive platform for delivering products and services. This platform is, to some extent, mediated by search engines in order to meet the needs of users seeking information ...
Singh, Vikash Kumar
core  

Home - About - Disclaimer - Privacy