Sciweavers

1943 search results - page 311 / 389
» Web application security engineering
Sort
View
148
Voted
EMSOFT
2005
Springer
15 years 9 months ago
High performance annotation-aware JVM for Java cards
Early applications of smart cards have focused in the area of personal security. Recently, there has been an increasing demand for networked, multi-application cards. In this new ...
Ana Azevedo, Arun Kejariwal, Alexander V. Veidenba...
ICIP
2001
IEEE
16 years 5 months ago
Region-based color image indexing and retrieval
In this paper a region-based color image indexing and retrieval algorithm is presented. As a basis for the indexing, a novel K-Means segmentation algorithm is used, modified so as...
Ioannis Kompatsiaris, Evagelia Triantafillou, Mich...
WWW
2009
ACM
16 years 4 months ago
Semantic wiki aided business process specification
This paper formulates a collaborative system for modeling business application. The system uses a Semantic Wiki to enable collaboration between the various stakeholders involved i...
Toufeeq Hussain, Rajesh Balakrishnan, Amar Viswana...
HICSS
2010
IEEE
180views Biometrics» more  HICSS 2010»
15 years 11 months ago
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity
Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While m...
Craig A. Shue, Minaxi Gupta
ICDM
2008
IEEE
117views Data Mining» more  ICDM 2008»
15 years 10 months ago
Semantic Full-Text Search with ESTER: Scalable, Easy, Fast
We present a demo of ESTER, a search engine that combines the ease of use, speed and scalability of full-text search with the powerful semantic capabilities of ontologies. ESTER s...
Holger Bast, Fabian M. Suchanek, Ingmar Weber