Vulnerability-driven filtering of network data can offer a fast and easy-to-deploy alternative or intermediary to software patching, as exemplified in Shield [43]. In this paper, ...
Charles Reis, John Dunagan, Helen J. Wang, Opher D...
In this paper, we present the design and implementation of Ovid, a browser for Grid-related information. The key goal of Ovid is to support the seamless navigation of users in the...
Marios D. Dikaiakos, A. Artemiou, George Tsouloupa...
The recent revolution of digital camera technology has resulted in much larger collections of images. Image browsing techniques thus become increasingly important for overview and...
The IST project Cuidado, which started in January 2001, aims at producing the first entirely automatic chain for extracting and exploiting musical metadata for browsing music. The...
Browsers’ isolation mechanisms are critical to users’ safety and privacy on the web. Achieving proper isolations, however, is very difficult. Historical data show that even fo...