Sciweavers

22864 search results - page 4508 / 4573
» An Integrated and
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
14 years 11 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
ICDE
2010
IEEE
178views Database» more  ICDE 2010»
14 years 11 months ago
The Hybrid-Layer Index: A synergic approach to answering top-k queries in arbitrary subspaces
In this paper, we propose the Hybrid-Layer Index (simply, the HL-index) that is designed to answer top-k queries efficiently when the queries are expressed on any arbitrary subset ...
Jun-Seok Heo, Junghoo Cho, Kyu-Young Whang
ICDE
2010
IEEE
220views Database» more  ICDE 2010»
14 years 11 months ago
Profiling linked open data with ProLOD
Linked open data (LOD), as provided by a quickly growing number of sources constitutes a wealth of easily accessible information. However, this data is not easy to understand. It i...
Christoph Böhm, Felix Naumann, Ziawasch Abedj...
ICIP
2010
IEEE
14 years 11 months ago
Streaming Compressive Sensing for high-speed periodic videos
The ability of Compressive Sensing (CS) to recover sparse signals from limited measurements has been recently exploited in computational imaging to acquire high-speed periodic and...
M. Salman Asif, Dikpal Reddy, Petros Boufounos, As...
ICISS
2010
Springer
14 years 11 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
« Prev « First page 4508 / 4573 Last » Next »