Sciweavers

15379 search results - page 185 / 3076
» Protecting users from
Sort
View
ESSOS
2010
Springer
15 years 7 months ago
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests
Protecting users in the ubiquitous online world is becoming more and more important, as shown by web application security – or the lack thereof – making the mainstream news. On...
Philippe De Ryck, Lieven Desmet, Thomas Heyman, Fr...
IEEEARES
2007
IEEE
15 years 5 months ago
A Near-Real-Time Behaviour Control Framework
The NuBric behaviour control framework (BCF) is a near-real-time framework written entirely in Java based on the paradigms of both role based access control (RBAC) and policy base...
Bastian Preindl, Alexander Schatten
CHI
2009
ACM
15 years 11 months ago
Out from behind the curtain: learning from a human auditory display
In this paper we describe an approach to gathering design requirements for a software auditory display by analyzing user interactions with an ideal partner: a talking human contro...
Peter Parente, Gary Bishop
90
Voted
CORR
2006
Springer
126views Education» more  CORR 2006»
14 years 11 months ago
Evaluating the Robustness of Learning from Implicit Feedback
This paper evaluates the robustness of learning from implicit feedback in web search. In particular, we create a model of user behavior by drawing upon user studies in laboratory ...
Filip Radlinski, Thorsten Joachims
65
Voted
ICMCS
2005
IEEE
88views Multimedia» more  ICMCS 2005»
15 years 4 months ago
Hash-based Counter Scheme for Digital Rights Management
This paper describes a counter scheme that uses hash functions to count how many times the user is allowed to play protected content in a DRM-enabled player. The proposed basic sc...
Mikko Löytynoja, Tapio Seppänen