Sciweavers

6955 search results - page 1255 / 1391
» Mobile Recommender Systems
Sort
View
ESSOS
2011
Springer
13 years 2 months ago
SessionShield: Lightweight Protection against Session Hijacking
The class of Cross-site Scripting (XSS) vulnerabilities is the most prevalent security problem in the field of Web applications. One of the main attack vectors used in connection ...
Nick Nikiforakis, Wannes Meert, Yves Younan, Marti...
PERVASIVE
2011
Springer
13 years 1 months ago
n-Gram Geo-trace Modeling
As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. ...
Senaka Buthpitiya, Ying Zhang, Anind K. Dey, Marti...
MDM
2009
Springer
299views Communications» more  MDM 2009»
14 years 5 months ago
Aggregate Location Monitoring for Wireless Sensor Networks: A Histogram-Based Approach
Location monitoring systems are used to detect human activities and provide monitoring services, e.g., aggregate queries. In this paper, we consider an aggregate location monitori...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
CADE
2011
Springer
12 years 10 months ago
Static Analysis of Android Programs
Android is a programming language based on Java and an operating system for embedded or mobile devices whose upper layers are written in that language. It features an extended even...
Étienne Payet, Fausto Spoto
ICB
2009
Springer
116views Biometrics» more  ICB 2009»
14 years 3 months ago
Face Video Competition
Person recognition using facial features, e.g., mug-shot images, has long been used in identity documents. However, due to the widespread use of web-cams and mobile devices embedde...
Norman Poh, Chi-Ho Chan, Josef Kittler, Séb...
« Prev « First page 1255 / 1391 Last » Next »