Sciweavers

697 search results - page 68 / 140
» Information Rich Glyphs for Software Management Data
Sort
View
WWW
2007
ACM
14 years 8 months ago
Defeating script injection attacks with browser-enforced embedded policies
Web sites that accept and display content such as wiki articles or comments typically filter the content to prevent injected script code from running in browsers that view the sit...
Trevor Jim, Nikhil Swamy, Michael Hicks
EMISA
2004
Springer
14 years 1 months ago
A Virtual Laboratory for IT Security Education
Abstract: Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. I...
Ji Hu, Dirk Cordel, Christoph Meinel
CIKM
2008
Springer
13 years 9 months ago
Scalable community discovery on textual data with relations
Every piece of textual data is generated as a method to convey its authors' opinion regarding specific topics. Authors deliberately organize their writings and create links, ...
Huajing Li, Zaiqing Nie, Wang-Chien Lee, C. Lee Gi...
ICWS
2009
IEEE
14 years 4 months ago
A Conceptual Modeling Approach to Business Service Mashup Development
Professional mashups that include complex choreographies, data mediation, and result publishing within Web pages are still affected by implementation and design practices that rel...
Alessandro Bozzon, Marco Brambilla, Federico Miche...
BILDMED
2007
142views Algorithms» more  BILDMED 2007»
13 years 9 months ago
Interfacing Global and Local CBIR Systems for Medical Image Retrieval
Abstract. Contemporary picture archiving and communication systems are limited in managing large and varied image collections, because content-based image retrieval (CBIR) methods ...
Sameer Antani, Thomas Martin Deserno, L. Rodney Lo...