Sciweavers

2399 search results - page 126 / 480
» On Authentication between Human and Computer
Sort
View
CSREASAM
2010
15 years 2 months ago
A Hacking View of Access Control
The importance of computer security in order to maintain the confidentiality, integrity and availability of data and information is well known. Different mechanisms have been propo...
Pedro Diaz-Gomez, Gregory Steen
209
Voted
SAC
2011
ACM
14 years 6 months ago
Reliable protection against session fixation attacks
The term ‘Session Fixation vulnerability’ subsumes issues in Web applications that under certain circumstances enable the adversary to perform a Session Hijacking attack throu...
Martin Johns, Bastian Braun, Michael Schrank, Joac...
HT
2009
ACM
15 years 10 months ago
The redocumentation process of computer mediated activity traces: a general framework
The digital world enables the creation of personalized documents. In this paper we are interested in describing a computer mediated activity by a person throughout a semi-automati...
Leila Yahiaoui, Yannick Prié, Zizette Boufa...
ECCV
2006
Springer
16 years 6 months ago
Studying Aesthetics in Photographic Images Using a Computational Approach
Aesthetics, in the world of art and photography, refers to the principles of the nature and appreciation of beauty. Judging beauty and other aesthetic qualities of photographs is a...
Ritendra Datta, Dhiraj Joshi, Jia Li, James Ze Wan...
HT
2005
ACM
15 years 9 months ago
Distributed, real-time computation of community preferences
We describe the integration of smart digital objects with Hebbian learning to create a distributed, real-time, scalable approach to adapting to a community's preferences. We ...
Thomas Lutkenhouse, Michael L. Nelson, Johan Bolle...