Sciweavers

28821 search results - page 5667 / 5765
» Distributed and parallel systems
Sort
View
CCS
2007
ACM
15 years 9 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
CCS
2007
ACM
15 years 9 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
136
Voted
CIKM
2007
Springer
15 years 9 months ago
Predictive user click models based on click-through history
Web search engines consistently collect information about users interaction with the system: they record the query they issued, the URL of presented and selected documents along w...
Benjamin Piwowarski, Hugo Zaragoza
CIKM
2007
Springer
15 years 9 months ago
A volcano erupts: semantically mediated integration of heterogeneous volcanic and atmospheric data
We present a research effort into the application of semantic web methods and technologies to address the challenging problem of integrating heterogeneous volcanic and atmospheri...
Peter Fox, Deborah L. McGuinness, Robert Raskin, A...
124
Voted
CIVR
2007
Springer
180views Image Analysis» more  CIVR 2007»
15 years 9 months ago
Probabilistic matching and resemblance evaluation of shapes in trademark images
We present a novel matching and similarity evaluation method for planar geometric shapes represented by sets of polygonal curves. Given two shapes, the matching algorithm randomly...
Helmut Alt, Ludmila Scharf, Sven Scholz
« Prev « First page 5667 / 5765 Last » Next »