Sciweavers

25218 search results - page 5025 / 5044
» A Logic-Based Information System
Sort
View
ACMDIS
2010
ACM
13 years 5 months ago
Design's processional character
In this paper, we examine the ideas behind and reactions to a prototype online tool designed, in-house, for an art college's interaction design department. The web-based prot...
Laurel Swan, Diana Tanase, Alex S. Taylor
ACSAC
2010
IEEE
13 years 5 months ago
FIRM: capability-based inline mediation of Flash behaviors
The wide use of Flash technologies makes the security risks posed by Flash content an increasingly serious issue. Such risks cannot be effectively addressed by the Flash player, w...
Zhou Li, XiaoFeng Wang
ACSAC
2010
IEEE
13 years 5 months ago
Breaking e-banking CAPTCHAs
Many financial institutions have deployed CAPTCHAs to protect their services (e.g., e-banking) from automated attacks. In addition to CAPTCHAs for login, CAPTCHAs are also used to...
Shujun Li, S. Amier Haider Shah, M. Asad Usman Kha...
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 5 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
GIS
2010
ACM
13 years 5 months ago
Tolerance geometry: Euclid's first postulate for points and lines with extension
Object representation and reasoning in vector based geographic information systems (GIS) is based on Euclidean geometry. Euclidean geometry is built upon Euclid's first postu...
Gwen Wilke, Andrew U. Frank
« Prev « First page 5025 / 5044 Last » Next »