Sciweavers

227 search results - page 44 / 46
» Integrated use of Web technologies to deliver a secure colla...
Sort
View
WWW
2010
ACM
14 years 1 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
IEEECIT
2006
IEEE
14 years 7 days ago
One Touch Logon: Replacing Multiple Passwords with Single Fingerprint Recognition
— User authentication is still heavily reliant on the use of passwords, and the security problems associated with passwords are becoming more and more serious. The main causes of...
Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee,...
WIKIS
2006
ACM
14 years 4 days ago
Semantic Wikipedia
Wikipedia is the world’s largest collaboratively edited source of encyclopaedic knowledge. But in spite of its utility, its contents are barely machine-interpretable. Structural...
Heiko Haller, Markus Krötzsch, Max Völke...
PDC
2004
ACM
13 years 11 months ago
Lost in translation: a critical analysis of actors, artifacts, agendas, and arenas in participatory design
As computer technologies start to permeate the everyday activities of a continuously growing population, social and technical as well as political and legal issues will surface. P...
Rogério De Paula
ADCS
2004
13 years 7 months ago
On the Effectiveness of Relevance Profiling
Relevance profiling is a general process for withindocument retrieval. Given a query, a profile of retrieval status values is computed by sliding a fixed sized window across a doc...
David J. Harper, David Lee