Sciweavers

157 search results - page 22 / 32
» Detecting semantic cloaking on the web
Sort
View
DIMVA
2008
13 years 9 months ago
On Race Vulnerabilities in Web Applications
Abstract A web programmer often conceives its application as a sequential entity, thus neglecting the parallel nature of the underlying execution environment. In this environment, ...
Roberto Paleari, Davide Marrone, Danilo Bruschi, M...
DASFAA
2007
IEEE
138views Database» more  DASFAA 2007»
14 years 1 months ago
An Original Semantics to Keyword Queries for XML Using Structural Patterns
XML is by now the de facto standard for exporting and exchanging data on the web. The need for querying XML data sources whose structure is not fully known to the user and the need...
Dimitri Theodoratos, Xiaoying Wu
WECWIS
2005
IEEE
142views ECommerce» more  WECWIS 2005»
14 years 1 months ago
Implementing Web Service Protocols in SOA: WS-Coordination and WS-BusinessActivity
Web Service protocol standards should be unambiguous and provide a complete description of the allowed behavior of the protocols’ participants. Implementation of such protocols ...
Friedrich H. Vogt, Simon Zambrovski, Boris Gruschk...
SOUPS
2006
ACM
14 years 1 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...
CVPR
2010
IEEE
13 years 11 months ago
Harvesting Large-Scale Weakly-Tagged Image Databases from the Web
To leverage large-scale weakly-tagged images for computer vision tasks (such as object detection and scene recognition), a novel cross-modal tag cleansing and junk image filtering...
Jianping Fan