Sciweavers

800 search results - page 68 / 160
» XML access control using static analysis
Sort
View
107
Voted
ACSAC
1999
IEEE
15 years 7 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
CVPR
2008
IEEE
16 years 5 months ago
Radiometric calibration with illumination change for outdoor scene analysis
The images of an outdoor scene collected over time are valuable in studying the scene appearance variation which can lead to novel applications and help enhance existing methods t...
Seon Joo Kim, Jan-Michael Frahm, Marc Pollefeys
152
Voted
CSFW
2003
IEEE
15 years 8 months ago
Understanding SPKI/SDSI Using First-Order Logic
SPKI/SDSI is a language for expressing distributed access control policy, derived from SPKI and SDSI. We provide a first-order logic (FOL) semantics for SDSI, and show that it ha...
Ninghui Li, John C. Mitchell
131
Voted
WWW
2007
ACM
16 years 4 months ago
Mobile shopping assistant: integration of mobile applications and web services
The goal of this poster is to describe our implementation of a new architecture enabling efficient integration between mobile phone applications and Web Services. Using this archi...
Huaigu Wu, Yuri Natchetoi
121
Voted
ICDAR
2007
IEEE
15 years 10 months ago
Content-level Annotation of Large Collection of Printed Document Images
A large annotated corpus is critical to the development of robust optical character recognizers (OCRs). However, creation of annotated corpora is a tedious task. It is laborious, ...
Anand Kumar 0002, C. V. Jawahar