Sciweavers

452 search results - page 74 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
CSFW
2007
IEEE
15 years 4 months ago
Secure Implementations for Typed Session Abstractions
mplementations for Typed Session Abstractions Ricardo Corin1,2,3 Pierre-Malo Deni´elou1,2 C´edric Fournet1,2 Karthikeyan Bhargavan1,2 James Leifer1 1 MSR-INRIA Joint Centre 2 Mic...
Ricardo Corin, Pierre-Malo Deniélou, C&eacu...
118
Voted
SIGIR
2012
ACM
13 years 2 days ago
Fighting against web spam: a novel propagation method based on click-through data
Combating Web spam is one of the greatest challenges for Web search engines. State-of-the-art anti-spam techniques focus mainly on detecting varieties of spam strategies, such as ...
Chao Wei, Yiqun Liu, Min Zhang, Shaoping Ma, Liyun...
TEI
2010
ACM
151views Hardware» more  TEI 2010»
15 years 4 months ago
ChameleonBall
We propose a novel ball-type input/output (I/O) device—the ChameleonBall—that allows users to interact with colors in the real world. The ChameleonBall mainly consists of mult...
Koji Tsukada, Maho Oki
73
Voted
ECCV
2004
Springer
15 years 3 months ago
Virtual Touch Screen for Mixed Reality
Mixed Reality (MR) opens a new dimension for Human Computer Interaction (HCI). Combined with computer vision (CV) techniques, it is possible to create advanced input devices. This ...
Martin Tosas, Li Bai
91
Voted
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw