Sciweavers

1943 search results - page 273 / 389
» Web application security engineering
Sort
View
NDSS
2003
IEEE
15 years 9 months ago
Fighting Spam by Encapsulating Policy in Email Addresses
Everyday network interactions require users to give out their email address, yet no guarantees can be made about how this address will be used. Sometimes the address is given to a...
John Ioannidis
AAAI
2006
15 years 5 months ago
Bookmark Hierarchies and Collaborative Recommendation
GiveALink.org is a social bookmarking site where users may donate and view their personal bookmark files online securely. The bookmarks are analyzed to build a new generation of i...
Benjamin Markines, Lubomira Stoilova, Filippo Menc...
HOTSWUP
2009
ACM
15 years 8 months ago
An Implementation of the Linux Software Repository Model for Other Operating Systems
Year after year, the frequency of updated releases of software continues to increase. Without an automated install process, the result is either that a system installs software wi...
Neil McNab, Anthony Bryan
CHI
2011
ACM
14 years 7 months ago
No clicks, no problem: using cursor movements to understand and improve search
Understanding how people interact with search engines is important in improving search quality. Web search engines typically analyze queries and clicked results, but these actions...
Jeff Huang, Ryen W. White, Susan T. Dumais
NPC
2005
Springer
15 years 9 months ago
Globus Toolkit Version 4: Software for Service-Oriented Systems
The Globus Toolkit (GT) has been developed since the late 1990s to support the development of service-oriented distributed computing applications and infrastructures. Core GT compo...
Ian T. Foster