Sciweavers

2474 search results - page 427 / 495
» Attacks on Steganographic Systems
Sort
View
86
Voted
WWW
2008
ACM
16 years 16 days ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
WWW
2008
ACM
16 years 16 days ago
A systematic approach for cell-phone worm containment
Cell phones are increasingly becoming attractive targets of various worms, which cause the leakage of user privacy, extra service charges and depletion of battery power. In this w...
Liang Xie, Hui Song, Trent Jaeger, Sencun Zhu
WWW
2004
ACM
16 years 16 days ago
Web image learning for searching semantic concepts in image databases
Without textual descriptions or label information of images, searching semantic concepts in image databases is still a very challenging task. While automatic annotation techniques...
Chu-Hong Hoi, Michael R. Lyu
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
16 years 8 days ago
Real-time ranking with concept drift using expert advice
In many practical applications, one is interested in generating a ranked list of items using information mined from continuous streams of data. For example, in the context of comp...
Hila Becker, Marta Arias
CHI
2006
ACM
16 years 8 days ago
A fisheye follow-up: further reflections on focus + context
Information worlds continue to grow, posing daunting challenges for interfaces. This paper tries to increase our understanding of approaches to the problem, building on the Genera...
George W. Furnas