Sciweavers

169 search results - page 22 / 34
» Malicious interface design: exploiting the user
Sort
View
SPIESR
2001
152views Database» more  SPIESR 2001»
13 years 9 months ago
Video summarization and semantics editing tools
This paper describes a video summarization and semantics editing tool that is suited for content-based video indexing and retrieval with appropriate human operator assistance. The...
Li-Qun Xu, Jian Zhu, Fred Stentiford
NOSSDAV
2009
Springer
14 years 2 months ago
Dynamic overlay multicast in 3D video collaborative systems
Multi-stream/multi-site 3D video collaborative systems are promising as they enable remote users to interact in a 3D virtual space with a sense of co-presence. However, the decent...
Wanmin Wu, Zhenyu Yang, Klara Nahrstedt
TSE
2008
236views more  TSE 2008»
13 years 7 months ago
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies
Web applications are widely adopted and their correct functioning is mission critical for many businesses. At the same time, Web applications tend to be error prone and implementat...
Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Fr...
NAACL
2003
13 years 9 months ago
TAP-XL: An Automated Analyst's Assistant
The TAP-XL Automated Analyst’s Assistant is an application designed to help an Englishspeaking analyst write a topical report, culling information from a large inflow of multili...
Sean Colbath, Francis Kubala
SP
2009
IEEE
106views Security Privacy» more  SP 2009»
14 years 2 months ago
Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments
– HTTPS is designed to provide secure web communications over insecure networks. The protocol itself has been rigorously designed and evaluated by assuming the network as an adve...
Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang