Sciweavers

2084 search results - page 309 / 417
» Knowledge Exploitation from the Web
Sort
View
POPL
2007
ACM
14 years 10 months ago
JavaScript instrumentation for browser security
It is well recognized that JavaScript can be exploited to launch browser-based security attacks. We propose to battle such attacks using program instrumentation. Untrusted JavaScr...
Dachuan Yu, Ajay Chander, Nayeem Islam, Igor Serik...
ICDE
2010
IEEE
251views Database» more  ICDE 2010»
14 years 10 months ago
Viewing a World of Annotations through AnnoVIP
The proliferation of electronic content has notably lead to the apparition of large corpora of interrelated structured documents (such as HTML and XML Web pages) and semantic annot...
Konstantinos Karanasos, Spyros Zoupanos
WWW
2008
ACM
14 years 11 months ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen
USS
2008
14 years 21 days ago
Digital Objects as Passwords
Security proponents heavily emphasize the importance of choosing a strong password (one with high entropy). Unfortunately, by design, most humans are apparently incapable of gener...
Mohammad Mannan, Paul C. van Oorschot
CVPR
2009
IEEE
15 years 5 months ago
Towards Total Scene Understanding: Classification, Annotation and Segmentation in an Automatic Framework
Given an image, we propose a hierarchical generative model that classifies the overall scene, recognizes and segments each object component, as well as annotates the image with ...
Fei-Fei Li 0002, Li-Jia Li, Richard Socher