Sciweavers

4435 search results - page 176 / 887
» Networking named content
Sort
View
CCS
2007
ACM
15 years 11 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
MIR
2005
ACM
181views Multimedia» more  MIR 2005»
15 years 10 months ago
Video booklet: a natural video searching and browsing interface
In this paper, we propose a novel system, named Video Booklet, which enables efficient and natural personal video browsing and searching. In the system, firstly representative th...
Cai-Zhi Zhu, Xian-Sheng Hua, Tao Mei, Xiuqing Wu
DEBS
2007
ACM
15 years 9 months ago
Scalable event matching for overlapping subscriptions in pub/sub systems
Content-based publish/subscribe systems allow matching the content of events with predicates in the subscriptions. However, most existing systems only allow a limited set of opera...
Zhen Liu, Srinivasan Parthasarathy 0002, Anand Ran...
MIXER
2004
15 years 6 months ago
Design Patterns for Augmented Reality Systems
For documentation and development of augmented reality (AR) systems, we propose the use of design patterns. Patterns are structured descriptions of successfully applied problem-so...
Asa MacWilliams, Thomas Reicher, Gudrun Klinker, B...
DIM
2008
ACM
15 years 6 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le