Sciweavers

365 search results - page 71 / 73
» Exploiting Model-based Techniques for User Interfaces to Dat...
Sort
View
ISW
2009
Springer
15 years 6 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
CIVR
2009
Springer
133views Image Analysis» more  CIVR 2009»
15 years 6 months ago
MonuAnno: automatic annotation of georeferenced landmarks images
Uploading tourist photographs is a popular activity on photo sharing platforms. The manual annotation of these images is a tedious process and the users often upload their images ...
Adrian Popescu, Pierre-Alain Moëllic
123
Voted
RULEML
2004
Springer
15 years 5 months ago
Rule Learning for Feature Values Extraction from HTML Product Information Sheets
The Web is now a huge information repository with a rich semantic structure that, however, is primarily addressed to human understanding rather than automated processing by a compu...
Costin Badica, Amelia Badica
PPOPP
2009
ACM
16 years 6 days ago
MPIWiz: subgroup reproducible replay of mpi applications
Message Passing Interface (MPI) is a widely used standard for managing coarse-grained concurrency on distributed computers. Debugging parallel MPI applications, however, has alway...
Ruini Xue, Xuezheng Liu, Ming Wu, Zhenyu Guo, Weng...
WWW
2010
ACM
15 years 6 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...