Sciweavers

8141 search results - page 1512 / 1629
» Higher Order Generalization
Sort
View
103
Voted
SIGMOD
2004
ACM
124views Database» more  SIGMOD 2004»
15 years 3 months ago
An Interactive Clustering-based Approach to Integrating Source Query interfaces on the Deep Web
An increasing number of data sources now become available on the Web, but often their contents are only accessible through query interfaces. For a domain of interest, there often ...
Wensheng Wu, Clement T. Yu, AnHai Doan, Weiyi Meng
79
Voted
VRST
2004
ACM
15 years 3 months ago
Observing effects of attention on presence with fMRI
Presence is one of the goals of many virtual reality systems. Historically, in the context of virtual reality, the concept of presence has been associated much with spatial percep...
Sungkil Lee, Gerard Jounghyun Kim, Janghan Lee
WS
2004
ACM
15 years 3 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
CCS
2004
ACM
15 years 3 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
CCS
2004
ACM
15 years 3 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon
« Prev « First page 1512 / 1629 Last » Next »