Sciweavers

499 search results - page 32 / 100
» A Study on Latent Vulnerabilities
Sort
View
114
Voted
COLING
2010
14 years 7 months ago
Finding the Storyteller: Automatic Spoiler Tagging using Linguistic Cues
Given a movie comment, does it contain a spoiler? A spoiler is a comment that, when disclosed, would ruin a surprise or reveal an important plot detail. We study automatic methods...
Sheng Guo, Naren Ramakrishnan
189
Voted
FLAIRS
2011
14 years 3 months ago
Simulating Human Ratings on Word Concreteness
Psychological measures of concreteness of words are generally estimated by having humans provide ratings of words on a concreteness scale. Due to the limits of this technique, con...
Shi Feng, Zhiqiang Cai, Scott A. Crossley, Daniell...
85
Voted
HICSS
2005
IEEE
159views Biometrics» more  HICSS 2005»
15 years 6 months ago
Knowledge Management Capability Assessment: Validating a Knowledge Assets Measurement Instrument
Measurement of organizational knowledge assets is necessary to determine the effectiveness of knowledge management initiatives. A Knowledge Management Capability Assessment instru...
Ron Freeze, Uday R. Kulkarni
CSFW
2010
IEEE
15 years 4 months ago
Towards a Formal Foundation of Web Security
—We propose a formal model of web security based straction of the web platform and use this model to analyze the security of several sample web mechanisms and applications. We id...
Devdatta Akhawe, Adam Barth, Peifung E. Lam, John ...
75
Voted
SOUPS
2009
ACM
15 years 7 months ago
Conditioned-safe ceremonies and a user study of an application to web authentication
We introduce the notion of a conditioned-safe ceremony. A “ceremony” is similar to the conventional notion of a protocol, except that a ceremony explicitly includes human part...
Chris Karlof, J. D. Tygar, David Wagner