|
|
|
Karen Schnell, Kaushik Roy and Madhuri Siddula
In the United States, there are laws and standards guiding how people should be informed about the use of their private data. However, the challenge of communicating these guidelines to the naïve user is still at its peak. Research has shown that the wil...
ver más
|
|
|
|
|
|
|
Maxim Bakaev, Sebastian Heil and Martin Gaedke
Training data for user behavior models that predict subjective dimensions of visual perception are often too scarce for deep learning methods to be applicable. With the typical datasets in HCI limited to thousands or even hundreds of records, feature-bas...
ver más
|
|
|
|
|
|
|
Muhammad Fakhrur Rozi, Seiichi Ozawa, Tao Ban, Sangwook Kim, Takeshi Takahashi and Daisuke Inoue
JavaScript-based attacks injected into a webpage to perpetrate malicious activities are still the main problem in web security. Recent works have leveraged advances in artificial intelligence by considering many feature representations to improve the per...
ver más
|
|
|
|
|
|
|
Ramya Krishna Manugunta, Rytis Maskeliunas and Robertas Dama?evicius
Semantic segmentation is the task of clustering together parts of an image that belong to the same object class. Semantic segmentation of webpages is important for inferring contextual information from the webpage. This study examines and compares deep l...
ver más
|
|
|
|
|
|
|
Juan Manuel García Sánchez, Xavier Vilasís Cardona and Alexandre Lerma Martín
A methodology to prove the influence of car configurator webpage data for automotive manufacturers is developed across this research. Firstly, the correlation between online data and sales is measured. Afterward, car variant sales are predicted using a s...
ver más
|
|
|
|
|
|
|
Yu-Ting Lyu, Chia-Ming Jan, Herchang Ay, Chiu-Feng Lin, Haw-Ching Yang, Min-Chun Chuang, Heng-Sheng Lin and Tsung-Pin Hung
In the electrical discharge machining process, preliminary research has been able to effectively estimate machining accuracy in response to its long machining history and high discharge frequency characteristics. However, when processing abnormalities oc...
ver más
|
|
|
|
|
|
|
Wenjia Zhang, Jiancheng Zhu and Pu Zhao
City networks are multiplex and diverse rather than being regarded as part of a single universal model that is valid worldwide. This study contributes to the debate on multiple globalizations by distinguishing multiscale structures of world city networks...
ver más
|
|
|
|
|
|
|
KyungHyun Han and Seong Oun Hwang
Attackers use a variety of techniques to insert redirection JavaScript that leads a user to a malicious webpage, where a drive-by-download attack is executed. In particular, the redirection JavaScript in the landing site is obfuscated to avoid detection ...
ver más
|
|
|
|
|
|
|
Alexandros Fakis, Georgios Karopoulos and Georgios Kambourakis
To establish peer-to-peer connections and achieve real-time web-based communication, the Web Real-Time Communication (WebRTC) framework requires address information of the communicating peers. This means that users behind, say, Network Address Translatio...
ver más
|
|
|
|
|
|
|
Czeslaw Adamiak, Barbara Szyda, Anna Dubownik and David García-Álvarez
The rising number of homes and apartments rented out through Airbnb and similar peer-to-peer accommodation platforms cause concerns about the impact of such activity on the tourism sector and property market. To date, spatial analysis on peer-to-peer ren...
ver más
|
|
|
|