Sciweavers

1748 search results - page 301 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
CCS
2007
ACM
15 years 8 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
113
Voted
ICWS
2008
IEEE
15 years 3 months ago
Extending WS-Notification with an Expressive Event Notification Broker
Web service applications integrate explicit client-service interactions with notification-style programming. Such event-driven interactions are often called implicit invocations b...
Sven De Labey, Eric Steegmans
156
Voted
RULEML
2010
Springer
15 years 5 days ago
Visualizing Logical Dependencies in SWRL Rule Bases
Rule bases are common in many business rule applications, clinical decision support programs, and other types of intelligent systems. As the size of the rule bases grows and the in...
Saeed Hassanpour, Martin J. O'Connor, Amar K. Das
102
Voted
ICMCS
2007
IEEE
170views Multimedia» more  ICMCS 2007»
15 years 8 months ago
Video Copy Detection on the Internet: The Challenges of Copyright and Multiplicity
This paper presents applications for dealing with videos on the web, using an efficient technique for video copy detection in large archives. Managing videos on the web is the so...
Julien Law-To, Valérie Gouet-Brunet, Olivie...
97
Voted
IFIP
2003
Springer
15 years 7 months ago
Power-Saving in Wi-Fi Hotspots: An Analytical Study
Wi-Fi hotspots are one of the most promising scenarios for mobile computing. In this scenario, a very limiting factor is the scarcity of mobile-device energetic resources. Both har...
Giuseppe Anastasi, Marco Conti, Enrico Gregori, An...