Sciweavers

67 search results - page 4 / 14
» Automatic Generation of History-Based Access Control from In...
Sort
View
ESORICS
2011
Springer
12 years 6 months ago
Protecting Private Web Content from Embedded Scripts
Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. We present a...
Yuchen Zhou, David Evans
RSP
2003
IEEE
149views Control Systems» more  RSP 2003»
13 years 11 months ago
Rapid Scheduling of Efficient VLSI Architectures for Next-Generation HSDPA
In this paper, an efficient design flow integrating Mentor Graphics Precesion C and HDL designer is derived. In this hybrid prototyping environment, efficient FPGA architectures a...
Yuanbin Guo, Gang Xu, Dennis McCain, Joseph R. Cav...
IUI
2005
ACM
13 years 11 months ago
Task aware information access for diagnosis of manufacturing problems
Pinpoint is a promising first step towards using a rich model of task context in proactive and dynamic IR systems. Pinpoint allows a user to navigate decision tree representations...
Larry Birnbaum, Wallace J. Hopp, Seyed M. R. Irava...
CADE
2005
Springer
14 years 6 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
ESORICS
2009
Springer
14 years 6 months ago
Automatically Generating Models for Botnet Detection
A botnet is a network of compromised hosts that is under the control of a single, malicious entity, often called the botmaster. We present a system that aims to detect bots, indepe...
Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan G...