Sciweavers

1757 search results - page 266 / 352
» Secure Content Validation
Sort
View
VL
2009
IEEE
118views Visual Languages» more  VL 2009»
15 years 6 months ago
What designers want: Needs of interactive application designers
Designers’ extensive software needs have not been adequately documented in the research literature, and are poorly supported by software. Without appropriate tools to support th...
Valentina Grigoreanu, Roland Fernandez, Kori Inkpe...
ICTA
2009
IEEE
15 years 5 months ago
Feasibility Analysis for SemiAutomatic Conversion of Text to Improve Readability
1 WCAG 2.0 (W3C Recommendation 11 Dec. 2008) recommendation includes a specific guideline regarding the readability of text contents. This paper presents an approach to adapt text ...
Susana Bautista, Pablo Gervás, R. Ignacio M...
INFOCOM
2009
IEEE
15 years 5 months ago
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen
ADBIS
2009
Springer
127views Database» more  ADBIS 2009»
15 years 5 months ago
Window Update Patterns in Stream Operators
Continuous queries applied over nonterminating data streams usually specify windows in order to obtain an evolving –yet restricted– set of tuples and thus provide timely result...
Kostas Patroumpas, Timos K. Sellis
CAIP
2009
Springer
15 years 5 months ago
A Methodology for Evaluating Illumination Artifact Removal for Corresponding Images
Robust stereo and optical flow disparity matching is essential for computer vision applications with varying illumination conditions. Most robust disparity matching algorithms rel...
Tobi Vaudrey, Andreas Wedel, Reinhard Klette