Sciweavers

2421 search results - page 460 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
WWW
2010
ACM
14 years 4 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
ER
2004
Springer
169views Database» more  ER 2004»
14 years 3 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
INFOCOM
2003
IEEE
14 years 3 months ago
S-MIP: A Seamless Handoff Architecture for Mobile IP
—As the number of Mobile IP (MIP) [2] users grow, so will the demand for delay sensitive real-time applications, such as audio streaming, that require seamless handoff, namely, a...
Robert Hsieh, Zhe Guang Zhou, Aruna Seneviratne
VIS
2003
IEEE
169views Visualization» more  VIS 2003»
14 years 11 months ago
Gaussian Transfer Functions for Multi-Field Volume Visualization
Volume rendering is a flexible technique for visualizing dense 3D volumetric datasets. A central element of volume rendering is the conversion between data values and observable q...
Aaron E. Lefohn, Charles D. Hansen, Emil Praun, Jo...
UIST
2005
ACM
14 years 3 months ago
Informal prototyping of continuous graphical interactions by demonstration
Informal prototyping tools have shown great potential in facilitating the early stage design of user interfaces. However, continuous interactions, an important constituent of high...
Yang Li, James A. Landay