Sciweavers

589 search results - page 87 / 118
» Generalized Dominators and Post-Dominators
Sort
View
MM
2006
ACM
330views Multimedia» more  MM 2006»
15 years 5 months ago
Visual attention detection in video sequences using spatiotemporal cues
Human vision system actively seeks interesting regions in images to reduce the search effort in tasks, such as object detection and recognition. Similarly, prominent actions in v...
Yun Zhai, Mubarak Shah
PEWASUN
2006
ACM
15 years 5 months ago
Experimental analysis of a transport protocol for ad hoc networks (TPA)
Many previous papers have pointed out that TCP performance in multi-hop ad hoc networks is not optimal. This is due to several TCP design principles that reflect the characteristi...
Giuseppe Anastasi, Emilio Ancillotti, Marco Conti,...
SAC
2006
ACM
15 years 5 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...
SACMAT
2006
ACM
15 years 5 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
SIGECOM
2006
ACM
93views ECommerce» more  SIGECOM 2006»
15 years 5 months ago
The sequential auction problem on eBay: an empirical analysis and a solution
Bidders on eBay have no dominant bidding strategy when faced with multiple auctions each offering an item of interest. As seen through an analysis of 1,956 auctions on eBay for a...
Adam I. Juda, David C. Parkes