Sciweavers

409 search results - page 53 / 82
» Review spam detection
Sort
View
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
15 years 5 months ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...
HIP
2005
Springer
208views Cryptology» more  HIP 2005»
15 years 5 months ago
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks
In this paper, we propose a new class of Human Interactive Proofs (HIPs) that allow a human to distinguish one computer from another. Unlike traditional HIPs, where the computer is...
Rachna Dhamija, J. D. Tygar
CVPR
2000
IEEE
15 years 4 months ago
An Effective Approach to Detect Lesions in Color Retinal Images
Diabetic-related eye diseases are the most common cause of blindness in the world. So far the most effective treatment for these eye diseases is early detection through regular sc...
Huan Wang, Wynne Hsu, Kheng Guan Goh, Mong-Li Lee
JIB
2007
91views more  JIB 2007»
14 years 11 months ago
IMS2 - An integrated medical software system for early lung cancer detection using ion mobility spectrometry data of human breat
IMS2 is an Integrated Medical Software system for the analysis of Ion Mobility Spectrometry (IMS) data. It assists medical staff with the following IMS data processing steps: acqu...
Jan Baumbach, Alexander Bunkowski, Sita Lange, Tim...
ICIP
2004
IEEE
16 years 1 months ago
Evaluation of shadow classification techniques for object detection and tracking
In a football stadium environment with multiple overhead floodlights, many protruding shadows can be observed originating from each of the targets. To successfully track individua...
John-Paul Renno, James Orwell, Graeme A. Jones