Sciweavers

1981 search results - page 267 / 397
» A Web User Profiling Approach
Sort
View
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 6 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
118
Voted
JUCS
2010
133views more  JUCS 2010»
15 years 26 days ago
Knowledge Authoring with ORE: Testing, Debugging and Validating Knowledge Rules in a Semantic Web Framework
Abstract: Ontology rule editing, testing, debugging and validation are still handcrafted and painful tasks. Nowadays, there is a lack of tools that take these tasks into considerat...
Andrés Muñoz Ortega, Jose M. Alcaraz...
ICWE
2010
Springer
15 years 11 days ago
Efficient Term Cloud Generation for Streaming Web Content
Large amounts of information are posted daily on the Web, such as articles published online by traditional news agencies or blog posts referring to and commenting on various events...
Odysseas Papapetrou, George Papadakis, Ekaterini I...
ICMCS
2009
IEEE
103views Multimedia» more  ICMCS 2009»
15 years 4 days ago
Web image retrieval via learning semantics of query image
The performance of traditional image retrieval approaches remains unsatisfactory, as they are restricted by the wellknown semantic gap and the diversity of textual semantics. To t...
Chuanghua Gui, Jing Liu, Changsheng Xu, Hanqing Lu
CCS
2011
ACM
14 years 2 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...