Sciweavers

1663 search results - page 141 / 333
» Computer Security in the Real World
Sort
View
128
Voted
ICPR
2000
IEEE
16 years 4 months ago
Feature Relevance Learning with Query Shifting for Content-Based Image Retrieval
Probabilistic feature relevance learning (PFRL) is an effective technique for adaptively computing local feature relevance for content-based image retrieval. It however becomes le...
Douglas R. Heisterkamp, Jing Peng, H. K. Dai
128
Voted
VRML
2000
ACM
15 years 8 months ago
MVIP - audio enabled multicast VNet
This paper presents a multicast approach to shared virtual worlds. A shared VRML world is described with integrated spatial audio in a freeware VRML browser. An implementation in ...
John L. Robinson, John A. Stewart, Isabelle Labb&e...
131
Voted
GIS
2010
ACM
15 years 1 months ago
Geolocation privacy and application platforms
Security and privacy issues for Location-Based Services (LBS) and geolocation-capable applications often revolve around designing a User Interface (UI) such that users are informe...
Nick Doty, Erik Wilde
127
Voted
SOSP
2007
ACM
16 years 18 days ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...
143
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Breaking e-banking CAPTCHAs
Many financial institutions have deployed CAPTCHAs to protect their services (e.g., e-banking) from automated attacks. In addition to CAPTCHAs for login, CAPTCHAs are also used to...
Shujun Li, S. Amier Haider Shah, M. Asad Usman Kha...