Sciweavers

12052 search results - page 2138 / 2411
» computer 2010
Sort
View
118
Voted
USS
2010
14 years 10 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
137
Voted
USS
2010
14 years 10 months ago
Building a Dynamic Reputation System for DNS
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command an...
Manos Antonakakis, Roberto Perdisci, David Dagon, ...
USS
2010
14 years 10 months ago
VEX: Vetting Browser Extensions for Security Vulnerabilities
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have...
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, ...
116
Voted
W4A
2010
ACM
14 years 10 months ago
Web not for all: a large scale study of web accessibility
The Web accessibility discipline strives for the study and improvement of front-end Web design towards people with disabilities. Best practices such as WCAG dictate how Web pages ...
Rui Lopes, Daniel Gomes, Luís Carriç...
181
Voted
WBIR
2010
SPRINGER
14 years 10 months ago
Normalized Measures of Mutual Information with General Definitions of Entropy for Multimodal Image Registration
Abstract. Mutual information (MI) was introduced for use in multimodal image registration over a decade ago [1,2,3,4]. The MI between two images is based on their marginal and join...
Nathan D. Cahill
« Prev « First page 2138 / 2411 Last » Next »