{"id":12325,"date":"2021-11-09T20:52:31","date_gmt":"2021-11-10T01:52:31","guid":{"rendered":"https:\/\/carleton.ca\/scs\/?page_id=12325"},"modified":"2021-12-06T18:48:33","modified_gmt":"2021-12-06T23:48:33","slug":"technical-reports-2004","status":"publish","type":"page","link":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/","title":{"rendered":"Technical Reports 2004"},"content":{"rendered":"<table style=\"width: 100%; margin: 0; padding: 0;\">\n<tbody>\n<tr style=\"background-color: #f5e1e1;\">\n<td style=\"font-weight: bold;\" colspan=\"4\">Technical Reports 2004<\/td>\n<td style=\"margin: 0; padding: 15px 0 0 0;\"><p><select id=\"TechReportYear\" style=\"font-size: 1em;\" onchange=\"var url = $(this).val(); window.location = url;\"><option selected=\"selected\" value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1982\/\">Select Year<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1982\/\">Tech Reports 1982<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1983\/\">Tech Reports 1983<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1984\/\">Tech Reports 1984<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1985\/\">Tech Reports 1985<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1986\/\">Tech Reports 1986<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1987\/\">Tech Reports 1987<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1988\/\">Tech Reports 1988<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1989\/\">Tech Reports 1989<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1990\/\">Tech Reports 1990<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1991\/\">Tech Reports 1991<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1992\/\">Tech Reports 1992<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1993\/\">Tech Reports 1993<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1994\/\">Tech Reports 1994<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1995\/\">Tech Reports 1995<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1996\/\">Tech Reports 1996<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1997\/\">Tech Reports 1997<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1998\/\">Tech Reports 1998<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1999\/\">Tech Reports 1999<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2000\/\">Tech Reports 2000<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2001\/\">Tech Reports 2001<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2002\/\">Tech Reports 2002<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2003\/\">Tech Reports 2003<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/\">Tech Reports 2004<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/\">Tech Reports 2005<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/\">Tech Reports 2006<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2007\/\">Tech Reports 2007<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2008\/\">Tech Reports 2008<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2009\/\">Tech Reports 2009<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2010\/\">Tech Reports 2010<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2011\/\">Tech Reports 2011<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2012\/\">Tech Reports 2012<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2013\/\">Tech Reports 2013<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2014\/\">Tech Reports 2014<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2015\/\">Tech Reports 2015<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2016\/\">Tech Reports 2016<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2017\/\">Tech Reports 2017<\/option><\/select><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 15%;\"><strong>Number<\/strong><\/td>\n<td style=\"width: 25%;\"><strong>Title<\/strong><\/td>\n<td style=\"width: 20%;\"><strong>Authors<\/strong><\/td>\n<td style=\"width: 20%;\"><strong>Date<\/strong><\/td>\n<td style=\"width: 20%;\"><strong>Download<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-04-01<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/tr-04-01-analyzing-user-choice-in-graphical-passwords\/\">Analyzing User Choice in Graphical Passwords<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Deholo Nali &amp; Julie Thorpe<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">May 2004<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-04-01.pdf\">TR-04-01.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-04-02<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/tr-04-02-a-monitoring-system-for-detecting-repeated-packets-with-applications-to-computer-worms\/\">A Monitoring System for Detecting Repeated Packets with Applications to Computer Worms<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">M. Vargas Martin, J.-M. Robert, P.C. Van Oorschot<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">June 2004<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-04-02.1.pdf\">TR-04-02.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-04-03<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/tr-04-03-feature-tracking-for-cut-detection\/\">Feature Tracking for Cut Detection<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Anthony Whitehead, Prosenjit Bose, Robert Laganiere<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">June 2004<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-04-03.pdf\">TR-04-03.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-04-04<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/tr-04-04-projective-space-temporal-synchronization-of-multiple-video-sequences\/\">Projective Space Temporal Synchronization of Multiple Video Sequences<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Anthony Whitehead, Robert Laganiere, Prosenjit Bose<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">June 2004<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-04-04.pdf\">TR-04-04.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-04-05<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/tr-04-05-calculating-the-meeting-point-of-scattered-robots-on-weighted-terrain-surfaces\/\">Calculating the Meeting Point of Scattered Robots on Weighted Terrain Surfaces<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Mark Lanthier, Doron Nussbaum, Tsuo-Jung Wang<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">August 2004<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-04-05.pdf\">TR-04-05.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-04-06<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/tr-04-06-dns-based-detection-of-scanning-worms-in-an-enterprise-network\/\">DNS-based Detection of Scanning Worms in an Enterprise Network<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">David Whyte, Evangelos Kranakis, P.C. Van Oorschot<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">August 2004<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-04-06.pdf\">TR-04-06.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>TR-04-07<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/tr-04-07-pretty-secure-bgp-psbgp\/\">Pretty Secure BGP (psBGP)<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Taw Wan, Evangelos Kranakis, P.C. Van Oorschot<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">September 2004<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-04-07.pdf\">TR-04-07.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-04-08<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/tr-04-08-approximate-distance-oracles-for-geometric-spanners\/\">Approximate Distance Oracles for Geometric Spanners<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Joachim Gudmundsson, Christos Levcopoulos, Giri Narasimhan, Michiel Smid<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">October 2004<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-04-08.pdf\">TR-04-08.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-04-09<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/tr-04-09-a-generic-attack-on-checksumming-based-software-tamper-resistance\/\">A generic attack on checksumming-based software tamper resistance<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Glenn Wurster, Paul Van Oorschot, Anil Somayaji<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">November 2004<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-04-09.pdf\">TR-04-09.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-04-10<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/tr-04-10-explorations-in-4-peg-tower-of-hanoi\/\">Explorations in 4-peg Tower of Hanoi<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Ben Houston &amp; Hassan Masum<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">November 2004<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-04-10.pdf\">TR-04-10.pdf<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Technical Reports 2004 Number Title Authors Date Download TR-04-01 Analyzing User Choice in Graphical Passwords Deholo Nali &amp; Julie Thorpe May 2004 TR-04-01.pdf TR-04-02 A Monitoring System for Detecting Repeated Packets with Applications to Computer Worms M. Vargas Martin, J.-M. Robert, P.C. Van Oorschot June 2004 TR-04-02.pdf TR-04-03 Feature Tracking for Cut Detection Anthony Whitehead, [&hellip;]<\/p>\n","protected":false},"author":49,"featured_media":0,"parent":11593,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Technical Reports 2004 - School of Computer Science<\/title>\n<meta name=\"description\" content=\"Technical Reports 2004 Number Title Authors Date Download TR-04-01 Analyzing User Choice in Graphical Passwords Deholo Nali &amp; Julie Thorpe May 2004\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/\",\"url\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/\",\"name\":\"Technical Reports 2004 - School of Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/scs\/#website\"},\"datePublished\":\"2021-11-10T01:52:31+00:00\",\"dateModified\":\"2021-12-06T23:48:33+00:00\",\"description\":\"Technical Reports 2004 Number Title Authors Date Download TR-04-01 Analyzing User Choice in Graphical Passwords Deholo Nali &amp; Julie Thorpe May 2004\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/scs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research\",\"item\":\"https:\/\/carleton.ca\/scs\/research\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SCS Technical Reports\",\"item\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Technical Reports 2004\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/scs\/#website\",\"url\":\"https:\/\/carleton.ca\/scs\/\",\"name\":\"School of Computer Science\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/scs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Technical Reports 2004 - School of Computer Science","description":"Technical Reports 2004 Number Title Authors Date Download TR-04-01 Analyzing User Choice in Graphical Passwords Deholo Nali &amp; Julie Thorpe May 2004","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/","url":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/","name":"Technical Reports 2004 - School of Computer Science","isPartOf":{"@id":"https:\/\/carleton.ca\/scs\/#website"},"datePublished":"2021-11-10T01:52:31+00:00","dateModified":"2021-12-06T23:48:33+00:00","description":"Technical Reports 2004 Number Title Authors Date Download TR-04-01 Analyzing User Choice in Graphical Passwords Deholo Nali &amp; Julie Thorpe May 2004","breadcrumb":{"@id":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/scs\/"},{"@type":"ListItem","position":2,"name":"Research","item":"https:\/\/carleton.ca\/scs\/research\/"},{"@type":"ListItem","position":3,"name":"SCS Technical Reports","item":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/"},{"@type":"ListItem","position":4,"name":"Technical Reports 2004"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/scs\/#website","url":"https:\/\/carleton.ca\/scs\/","name":"School of Computer Science","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/scs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"acf":{"banner_uploaded_image":{"ID":8983,"id":8983,"title":"Coding screen","filename":"laptop-code-1600.jpg","filesize":154356,"url":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600.jpg","link":"https:\/\/carleton.ca\/scs\/tech-support\/laptop-code-1600\/","alt":"Coding screen","author":"7","description":"Coding screen","caption":"","name":"laptop-code-1600","status":"inherit","uploaded_to":6535,"date":"2021-02-10 15:47:55","modified":"2021-11-25 20:57:39","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/carleton.ca\/scs\/wp\/wp-includes\/images\/media\/default.png","width":1600,"height":700,"sizes":{"thumbnail":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-160x70.jpg","thumbnail-width":160,"thumbnail-height":70,"medium":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-240x105.jpg","medium-width":240,"medium-height":105,"medium_large":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-768x336.jpg","medium_large-width":768,"medium_large-height":336,"large":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-400x175.jpg","large-width":400,"large-height":175,"gallery-thumb":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-300x230.jpg","gallery-thumb-width":300,"gallery-thumb-height":230,"1536x1536":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-1536x672.jpg","1536x1536-width":1536,"1536x1536-height":672,"2048x2048":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600.jpg","2048x2048-width":1600,"2048x2048-height":700,"banner":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600.jpg","banner-width":1600,"banner-height":700,"people":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-200x200.jpg","people-width":200,"people-height":200,"post-thumb":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-300x230.jpg","post-thumb-width":300,"post-thumb-height":230,"rotator-image":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-800x600.jpg","rotator-image-width":800,"rotator-image-height":600,"video-thumb":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-360x158.jpg","video-thumb-width":360,"video-thumb-height":158}},"banner_image_type":"upload","banner_button":"no","banner_opacity":"dark"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages\/12325"}],"collection":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/users\/49"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/comments?post=12325"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages\/12325\/revisions"}],"predecessor-version":[{"id":13126,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages\/12325\/revisions\/13126"}],"up":[{"embeddable":true,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages\/11593"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/media?parent=12325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}