Sciweavers

2409 search results - page 343 / 482
» Reverse engineering the Internet
Sort
View
122
Voted
WWW
2010
ACM
15 years 11 months ago
Regular expressions considered harmful in client-side XSS filters
Cross-site scripting flaws have now surpassed buffer overflows as the world’s most common publicly-reported security vulnerability. In recent years, browser vendors and resea...
Daniel Bates, Adam Barth, Collin Jackson
149
Voted
WWW
2010
ACM
15 years 11 months ago
Find me if you can: improving geographical prediction with social and spatial proximity
Geography and social relationships are inextricably intertwined; the people we interact with on a daily basis almost always live near us. As people spend more time online, data re...
Lars Backstrom, Eric Sun, Cameron Marlow
123
Voted
WWW
2009
ACM
15 years 11 months ago
A probabilistic model based approach for blended search
In this paper, we propose to model the blended search problem by assuming conditional dependencies among queries, VSEs and search results. The probability distributions of this mo...
Ning Liu, Jun Yan, Zheng Chen
LAWEB
2009
IEEE
15 years 11 months ago
A Model-Based Approach for Developing Vectorial User Interfaces
—This paper presents a model-based approach for developing vectorial user interfaces to an interactive applications, whether it is a web or a stand-alone applications. A vectoria...
Jean Vanderdonckt, Josefina Guerrero García...
AIRWEB
2009
Springer
15 years 11 months ago
Looking into the past to better classify web spam
Web spamming techniques aim to achieve undeserved rankings in search results. Research has been widely conducted on identifying such spam and neutralizing its influence. However,...
Na Dai, Brian D. Davison, Xiaoguang Qi