Sciweavers

2977 search results - page 397 / 596
» Evaluating the Effectiveness of Keyword Search
Sort
View
SP
2010
IEEE
212views Security Privacy» more  SP 2010»
15 years 5 months ago
State of the Art: Automated Black-Box Web Application Vulnerability Testing
—Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, w...
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mi...
IADIS
2004
15 years 3 months ago
Learning with Technology: The Way we Think in the Digital ERA
Operating modern digital environments, as computer software and digital instruments require users to master a large variety of cognitive, motor, sociological, and emotional skills...
Yoram Eshet
ISCAPDCS
2004
15 years 3 months ago
Pushmepullyou: The Reality of Interaction with Shared Objects in Networked Walk-in Displays
This paper investigates the reality of shared manipulation of objects between users in distributed walkin displays and presents solutions to address the effects of constraints of ...
David J. Roberts, Oliver Otto, Robin Wolff
WWW
2009
ACM
16 years 2 months ago
Cascading style sheets: a novel approach towards productive styling with today's standards
In this paper we present an approach of generating Cascading Style Sheet documents automatically if the desired effect on the content elements is specified. While a Web user agent...
Matthias Keller, Martin Nussbaumer
KDD
2004
ACM
302views Data Mining» more  KDD 2004»
16 years 2 months ago
Redundancy based feature selection for microarray data
In gene expression microarray data analysis, selecting a small number of discriminative genes from thousands of genes is an important problem for accurate classification of diseas...
Lei Yu, Huan Liu