Sciweavers

5456 search results - page 1037 / 1092
» A study of Object Evolution
Sort
View
134
Voted
RTSS
2007
IEEE
15 years 9 months ago
I/O-Aware Deadline Miss Ratio Management in Real-Time Embedded Databases
Recently, cheap and large capacity non-volatile memory such as flash memory is rapidly replacing disks not only in embedded systems, but also in high performance servers. Unlike ...
Woochul Kang, Sang Hyuk Son, John A. Stankovic, Me...
138
Voted
CCS
2007
ACM
15 years 8 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
106
Voted
CCS
2007
ACM
15 years 8 months ago
An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism
Browsers’ isolation mechanisms are critical to users’ safety and privacy on the web. Achieving proper isolations, however, is very difficult. Historical data show that even fo...
Shuo Chen, David Ross, Yi-Min Wang
98
Voted
CIKM
2007
Springer
15 years 8 months ago
Shine: search heterogeneous interrelated entities
Heterogeneous entities or objects are very common and are usually interrelated with each other in many scenarios. For example, typical Web search activities involve multiple types...
Xuanhui Wang, Jian-Tao Sun, Zheng Chen
125
Voted
CIVR
2007
Springer
177views Image Analysis» more  CIVR 2007»
15 years 8 months ago
Matching ottoman words: an image retrieval approach to historical document indexing
Large archives of Ottoman documents are challenging to many historians all over the world. However, these archives remain inaccessible since manual transcription of such a huge vo...
Esra Ataer, Pinar Duygulu
« Prev « First page 1037 / 1092 Last » Next »