Sciweavers

23915 search results - page 4726 / 4783
» Management
Sort
View
135
Voted
ACSAC
2010
IEEE
15 years 19 days ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
131
Voted
ACSAC
2010
IEEE
15 years 19 days ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
133
Voted
ACSAC
2010
IEEE
15 years 19 days ago
Breaking e-banking CAPTCHAs
Many financial institutions have deployed CAPTCHAs to protect their services (e.g., e-banking) from automated attacks. In addition to CAPTCHAs for login, CAPTCHAs are also used to...
Shujun Li, S. Amier Haider Shah, M. Asad Usman Kha...
121
Voted
ANCS
2010
ACM
15 years 19 days ago
DOS: a scalable optical switch for datacenters
This paper discusses the architecture and performance studies of Datacenter Optical Switch (DOS) designed for scalable and highthroughput interconnections within a data center. DO...
Xiaohui Ye, Yawei Yin, S. J. Ben Yoo, Paul Vincent...
150
Voted
CIKM
2010
Springer
15 years 18 days ago
A probabilistic topic-connection model for automatic image annotation
The explosive increase of image data on Internet has made it an important, yet very challenging task to index and automatically annotate image data. To achieve that end, sophistic...
Xin Chen, Xiaohua Hu, Zhongna Zhou, Caimei Lu, Gai...
« Prev « First page 4726 / 4783 Last » Next »