Sciweavers

816 search results - page 153 / 164
» Engineering the Presentation Layer of Adaptable Web Informat...
Sort
View
76
Voted
WWW
2009
ACM
15 years 10 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...
JLP
2006
155views more  JLP 2006»
14 years 9 months ago
A formally grounded software specification method
One of the goals of software engineering is to provide what is necessary to write relevant, legible, useful descriptions of the systems to be developed, which will be the basis of...
Christine Choppy, Gianna Reggio
MM
2010
ACM
251views Multimedia» more  MM 2010»
14 years 9 months ago
A cognitive approach for effective coding and transmission of 3D video
Reliable delivery of 3D video contents to a wide set of users is expected to be the next big revolution in multimedia applications provided that it is possible to grant a certain ...
Simone Milani, Giancarlo Calvagno
SAC
2009
ACM
15 years 4 months ago
A personalized framework for trust assessment
The number of computational trust models has been increasing rapidly in recent years, yet their applications for automating trust evaluation are still limited. The main obstacle i...
Trung Dong Huynh
IAW
2003
IEEE
15 years 2 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...