Sciweavers

776 search results - page 121 / 156
» Securing user inputs for the web
Sort
View
149
Voted
JAIR
2011
144views more  JAIR 2011»
15 years 5 days ago
Non-Deterministic Policies in Markovian Decision Processes
Markovian processes have long been used to model stochastic environments. Reinforcement learning has emerged as a framework to solve sequential planning and decision-making proble...
Mahdi Milani Fard, Joelle Pineau
161
Voted
SEMCO
2007
IEEE
15 years 11 months ago
A Semantic Matching Algorithm for Discovery in UDDI
One of the key objectives of web service technology is to construct processes that enable service providers to inter-connect with their clients. The industry has developed the UDD...
Unai Aguilera, Joseba Abaitua, Josuka Diaz, David ...
CCS
2006
ACM
15 years 9 months ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
ISM
2006
IEEE
104views Multimedia» more  ISM 2006»
15 years 11 months ago
A Novel Invisible Color Image Watermarking Scheme Using Image Adaptive Watermark Creation and Robust Insertion-Extraction
In this paper we present a robust and novel strategic invisible approach for insertion-extraction of a digital watermark, a color image, into color images. The novelty of our sche...
Saraju P. Mohanty, Parthasarathy Guturu, Elias Kou...
ACSAC
2008
IEEE
15 years 11 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh