Sciweavers

867 search results - page 141 / 174
» Secure Input for Web Applications
Sort
View
APLAS
2008
ACM
15 years 3 months ago
JavaScript Instrumentation in Practice
JavaScript has been exploited to launch various browser-based attacks. Our previous work proposed a theoretical framework applying policy-based code instrumentation to JavaScript. ...
Haruka Kikuchi, Dachuan Yu, Ajay Chander, Hiroshi ...
SACMAT
2010
ACM
15 years 5 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
BMCBI
2008
122views more  BMCBI 2008»
15 years 1 months ago
High-throughput bioinformatics with the Cyrille2 pipeline system
Background: Modern omics research involves the application of high-throughput technologies that generate vast volumes of data. These data need to be pre-processed, analyzed and in...
Mark W. E. J. Fiers, Ate van der Burgt, Erwin Date...
VCIP
2000
196views Communications» more  VCIP 2000»
15 years 2 months ago
MIME: a gesture-driven computer interface
MIME (Mime Is Manual Expression) is a computationally efficient computer vision system for recognizing hand gestures. The system is intended to replace the mouse interface on a st...
Daniel Heckenberg, Brian Lovell
EUROPAR
2003
Springer
15 years 6 months ago
Delivering Data Management for Engineers on the Grid
Engineering design search and optimisation is a computationally expensive and data intensive process. Grid technology offers great potential to increase the efficiency of this proc...
Jasmin L. Wason, Marc Molinari, Zhuoan Jiao, Simon...