Sciweavers

867 search results - page 137 / 174
» Secure Input for Web Applications
Sort
View
CORR
2011
Springer
195views Education» more  CORR 2011»
13 years 3 months ago
Context-aware Authorization in Highly Dynamic Environments
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user ne...
Jean-Yves Tigli, Stephane Lavirotte, Gaëtan R...
CSR
2007
Springer
14 years 3 months ago
Maximal Intersection Queries in Randomized Graph Models
Consider a family of sets and a single set, called query set. How can one quickly find a member of the family which has a maximal intersection with the query set? Strict time cons...
Benjamin Hoffmann, Yury Lifshits, Dirk Nowotka
TOG
2012
193views Communications» more  TOG 2012»
11 years 11 months ago
Selectively de-animating video
We present a semi-automated technique for selectively deanimating video to remove the large-scale motions of one or more objects so that other motions are easier to see. The user ...
Jiamin Bai, Aseem Agarwala, Maneesh Agrawala, Ravi...
GLOBECOM
2009
IEEE
14 years 3 months ago
On the Eyeshots of BGP Vantage Points
—The publicly available BGP vantage points (VPs) have been heavily used by the research community to build the Internet autonomous system (AS) level topology, which is a key inpu...
Kai Chen, Chengchen Hu, Wenwen Zhang, Yan Chen, Bi...
CSFW
2007
IEEE
14 years 3 months ago
Probability of Error in Information-Hiding Protocols
Randomized protocols for hiding private information can often be regarded as noisy channels in the informationtheoretic sense, and the inference of the concealed information can b...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...