Sciweavers

2250 search results - page 88 / 450
» Authorizing applications in singularity
Sort
View
SODA
2004
ACM
127views Algorithms» more  SODA 2004»
14 years 11 months ago
An optimal randomized algorithm for maximum Tukey depth
We present the first optimal algorithm to compute the maximum Tukey depth (also known as location or halfspace depth) for a non-degenerate point set in the plane. The algorithm is...
Timothy M. Chan
CHI
2007
ACM
15 years 10 months ago
BrickRoad: a light-weight tool for spontaneous design of location-enhanced applications
It is difficult to design and test location-enhanced applications. A large part of this difficulty is due to the added complexity of supporting location. Wizard of Oz (WOz) has be...
Alan L. Liu, Yang Li
CIIT
2004
14 years 11 months ago
DECAF: A digital classroom application framework
This paper outlines the design and evaluation of the Digital Classroom Application Framework (DeCAF). DeCAF is designed to provide an environment upon which multimedia application...
Allan Knight, Kevin C. Almeroth
OTM
2007
Springer
15 years 4 months ago
Prevention of Cross-Site Scripting Attacks on Current Web Applications
Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models and organization...
Joaquín García-Alfaro, Guillermo Nav...
EICS
2010
ACM
15 years 3 months ago
Using ensembles of decision trees to automate repetitive tasks in web applications
Web applications such as web-based email, spreadsheets and form filling applications have become ubiquitous. However, many of the tasks that users try to accomplish with such web ...
Zachary Bray, Per Ola Kristensson