Sciweavers

327 search results - page 33 / 66
» Integrated Risk Analysis for a Commercial Computing Service
Sort
View
ACSAC
2010
IEEE
13 years 6 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
CVPR
2004
IEEE
14 years 10 months ago
Fast, Integrated Person Tracking and Activity Recognition with Plan-View Templates from a Single Stereo Camera
Copyright 2004 IEEE. Published in Conference on Computer Vision and Pattern Recognition (CVPR-2004), June 27 - July 2, 2004, Washington DC. Personal use of this material is permit...
Michael Harville, Dalong Li
IEEEARES
2008
IEEE
14 years 2 months ago
Intensive Programme on Information and Communication Security
IT Security is a problem that can only be addressed and taught holistically. Just as broad as the field of ICT itself, IT Security is an integral part of all network and software ...
Christian Schläger, Ludwig Fuchs, Günthe...
WWW
2008
ACM
13 years 8 months ago
KC3 browser: semantic mash-up and link-free browsing
This paper proposes a general framework of for a system with a semantic browsing and visualization interface called Knowledge Communication, Collaboration and Creation Browser (KC...
Michiaki Iwazume, Ken Kaneiwa, Koji Zettsu, Takafu...
WWW
2009
ACM
14 years 9 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang