Sciweavers

15379 search results - page 185 / 3076
» Protecting users from
Sort
View
ESSOS
2010
Springer
16 years 12 days ago
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests
Protecting users in the ubiquitous online world is becoming more and more important, as shown by web application security – or the lack thereof – making the mainstream news. On...
Philippe De Ryck, Lieven Desmet, Thomas Heyman, Fr...
IEEEARES
2007
IEEE
15 years 9 months ago
A Near-Real-Time Behaviour Control Framework
The NuBric behaviour control framework (BCF) is a near-real-time framework written entirely in Java based on the paradigms of both role based access control (RBAC) and policy base...
Bastian Preindl, Alexander Schatten
113
Voted
CHI
2009
ACM
16 years 4 months ago
Out from behind the curtain: learning from a human auditory display
In this paper we describe an approach to gathering design requirements for a software auditory display by analyzing user interactions with an ideal partner: a talking human contro...
Peter Parente, Gary Bishop
148
Voted
CORR
2006
Springer
126views Education» more  CORR 2006»
15 years 3 months ago
Evaluating the Robustness of Learning from Implicit Feedback
This paper evaluates the robustness of learning from implicit feedback in web search. In particular, we create a model of user behavior by drawing upon user studies in laboratory ...
Filip Radlinski, Thorsten Joachims
110
Voted
ICMCS
2005
IEEE
88views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Hash-based Counter Scheme for Digital Rights Management
This paper describes a counter scheme that uses hash functions to count how many times the user is allowed to play protected content in a DRM-enabled player. The proposed basic sc...
Mikko Löytynoja, Tapio Seppänen