Sciweavers

739 search results - page 92 / 148
» Information Flow in Credential Systems
Sort
View
WWW
2004
ACM
14 years 8 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
IADIS
2008
13 years 9 months ago
Design of an Automated System for Clustering Heterogeneous Data
The goal of this work is to study the feasibility of a Heterogeneous Data Classification and Search (HDCS) system and to provide a possible design for its implementing. In order t...
Dorin Carstoiu, Alexandra Cernian, Adriana Olteanu...
CVPR
2009
IEEE
15 years 3 months ago
Nonparametric Scene Parsing: Label Transfer via Dense Scene Alignment
In this paper we propose a novel nonparametric approach for object recognition and scene parsing using dense scene alignment. Given an input image, we retrieve its best matches ...
Antonio B. Torralba, Ce Liu, Jenny Yuen
KI
1999
Springer
13 years 12 months ago
Agents in Traffic Modelling - From Reactive to Social Behaviour
In modern societies the demand for mobility is increasing daily. Hence, one challenge to researchers dealing with traffic and transportation is to find efficient ways to model and ...
Ana L. C. Bazzan, Joachim Wahle, Franziska Klü...
USS
2008
13 years 10 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller