Sciweavers

2454 search results - page 212 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ECIR
2010
Springer
15 years 3 months ago
Statistics of Online User-Generated Short Documents
User-generated short documents assume an important role in online communication due to the established utilization of social networks and real-time text messaging on the Internet. ...
Giacomo Inches, Mark James Carman, Fabio Crestani
CAI
1999
Springer
15 years 1 months ago
Context in Artificial Intelligence: I. A Survey of the Literature
: Context is the challenge for the coming years in Artificial Intelligence. In the companion paper [8], we present the main results of discussions at two workshops and at the first...
Patrick Brézillon
INTERACT
2003
15 years 3 months ago
Proximal Interactions: A Direct Manipulation Technique for Wireless Networking
As a number of networked digital devices are ubiquitously used, control of inter-device communications becomes a complicated task. People can no longer keep track of all the device...
Jun Rekimoto, Yuji Ayatsuka, Michimune Kohno, Haru...
IDTRUST
2009
ACM
15 years 8 months ago
Palantir: a framework for collaborative incident response and investigation
Organizations owning cyber-infrastructure assets face large scale distributed attacks on a regular basis. In the face of increasing complexity and frequency of such attacks, we ar...
Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Mic...
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 8 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...