Sciweavers

1216 search results - page 185 / 244
» Modelling Safe Interface Interactions in Web Applications
Sort
View
LSO
2001
Springer
15 years 2 months ago
Knowledge Elicitation through Web-Based Data Mining Services
Knowledge is a vital component for organisational growth and data mining provides the technological basis for automated knowledge elicitation from data sources. The emergence of Ap...
Shonali Krishnaswamy, Seng Wai Loke, Arkady B. Zas...
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
15 years 4 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...
SOUPS
2005
ACM
15 years 3 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
WEBI
2009
Springer
15 years 4 months ago
In the Mood to Click? Towards Inferring Receptiveness to Search Advertising
Abstract—We present a method for modeling, and automatically inferring, the current interest of a user in search advertising. Our task is complementary to that of predicting ad r...
Qi Guo, Eugene Agichtein, Charles L. A. Clarke, Az...
IEEESCC
2007
IEEE
15 years 4 months ago
Deriving executable BPEL from UMM Business Transactions
UN/CEFACT’s Modeling Methodology (UMM) is a UML profile for modeling global B2B choreographies. The basic building blocks of UMM are business transactions, which describe the e...
Birgit Hofreiter, Christian Huemer, Philipp Liegl,...