Sciweavers

301 search results - page 50 / 61
» Associative information access using DualNAVI
Sort
View
WOWMOM
2005
ACM
126views Multimedia» more  WOWMOM 2005»
14 years 29 days ago
Personalized Service Composition for Ubiquitous Multimedia Delivery
Digital multimedia has gained popularity due to the huge success of the Internet. Users acquire and disseminate multimedia information using different types of devices and communi...
Swaroop Kalasapur, Mohan Kumar, Behrooz Shirazi
USENIX
2007
13 years 9 months ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
BMCBI
2007
135views more  BMCBI 2007»
13 years 7 months ago
DAVID Knowledgebase: a gene-centered database integrating heterogeneous gene annotation resources to facilitate high-throughput
Background: Due to the complex and distributed nature of biological research, our current biological knowledge is spread over many redundant annotation databases maintained by man...
Brad T. Sherman, Da Wei Huang, Qina Tan, Yongjian ...
SAC
2011
ACM
12 years 10 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
MHCI
2009
Springer
14 years 1 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi