Sciweavers

24529 search results - page 4843 / 4906
» Computing on Authenticated Data
Sort
View
MM
2010
ACM
210views Multimedia» more  MM 2010»
13 years 10 months ago
Increasing interactivity in street view web navigation systems
This paper presents some interactive features we have added on our street-view web navigation application. Our system allows to navigate through a huge amount of data (panoramas a...
Alexandre Devaux, Nicolas Paparoditis
MM
2010
ACM
265views Multimedia» more  MM 2010»
13 years 10 months ago
Affective image classification using features inspired by psychology and art theory
Images can affect people on an emotional level. Since the emotions that arise in the viewer of an image are highly subjective, they are rarely indexed. However there are situation...
Jana Machajdik, Allan Hanbury
CCS
2010
ACM
13 years 10 months ago
@spam: the underground on 140 characters or less
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blackl...
Chris Grier, Kurt Thomas, Vern Paxson, Michael Zha...
CCS
2010
ACM
13 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
CCS
2010
ACM
13 years 10 months ago
Modeling attacks on physical unclonable functions
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...
Ulrich Rührmair, Frank Sehnke, Jan Sölte...
« Prev « First page 4843 / 4906 Last » Next »