Sciweavers

348 search results - page 40 / 70
» Secure Computation on the Web: Computing without Simultaneou...
Sort
View
DSN
2004
IEEE
15 years 5 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
LAWEB
2009
IEEE
15 years 8 months ago
A Model-Based Approach for Developing Vectorial User Interfaces
—This paper presents a model-based approach for developing vectorial user interfaces to an interactive applications, whether it is a web or a stand-alone applications. A vectoria...
Jean Vanderdonckt, Josefina Guerrero García...
WS
2006
ACM
15 years 8 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
ISM
2005
IEEE
109views Multimedia» more  ISM 2005»
15 years 7 months ago
A Trust Model for Ubiquitous Systems based on Vectors of Trust Values
Ubiquitous Computing foresees a massively networked world supporting a population of diverse but cooperating mobile devices where trust relationships between entities are uncertai...
Hassan Jameel, Hung Le Xuan, Umar Kalim, Ali Sajja...
WWW
2008
ACM
16 years 2 months ago
Social and semantics analysis via non-negative matrix factorization
Social media such as Web forum often have dense interactions between user and content where network models are often appropriate for analysis. Joint non-negative matrix factorizat...
Zhi-Li Wu, Chi-Wa Cheng, Chun-hung Li