Sciweavers

4678 search results - page 859 / 936
» Integrated University Information Systems
Sort
View
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
15 years 5 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
MM
2005
ACM
104views Multimedia» more  MM 2005»
15 years 5 months ago
Post-bit: embodied video contents on tiny stickies
Post-Bit is a small e-paper device modeled after paper PostIts r 1 . We explored and designed interfaces to handle multimedia contents with paper-like manipulations using this epa...
Takashi Matsumoto, Tony Dunnigan, Maribeth Back
MMSEC
2005
ACM
137views Multimedia» more  MMSEC 2005»
15 years 5 months ago
A fragile watermarking scheme for 3D meshes
In this paper, we propose a new fragile watermarking scheme for 3D meshes. Firstly, the watermark information is adaptively embedded into the mesh geometry by slightly adjusting t...
Hao-Tian Wu, Yiu-ming Cheung
SACMAT
2005
ACM
15 years 5 months ago
Relevancy based access control of versioned XML documents
Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us w...
Mizuho Iwaihara, Somchai Chatvichienchai, Chutipor...
SACMAT
2005
ACM
15 years 5 months ago
Generalized XML security views
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [17] and later refined by Fan et al. [8]. The model consists of access control ...
Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadk...