Sciweavers

867 search results - page 141 / 174
» Secure Input for Web Applications
Sort
View
APLAS
2008
ACM
13 years 9 months ago
JavaScript Instrumentation in Practice
JavaScript has been exploited to launch various browser-based attacks. Our previous work proposed a theoretical framework applying policy-based code instrumentation to JavaScript. ...
Haruka Kikuchi, Dachuan Yu, Ajay Chander, Hiroshi ...
SACMAT
2010
ACM
14 years 17 hour ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
BMCBI
2008
122views more  BMCBI 2008»
13 years 7 months ago
High-throughput bioinformatics with the Cyrille2 pipeline system
Background: Modern omics research involves the application of high-throughput technologies that generate vast volumes of data. These data need to be pre-processed, analyzed and in...
Mark W. E. J. Fiers, Ate van der Burgt, Erwin Date...
VCIP
2000
196views Communications» more  VCIP 2000»
13 years 9 months ago
MIME: a gesture-driven computer interface
MIME (Mime Is Manual Expression) is a computationally efficient computer vision system for recognizing hand gestures. The system is intended to replace the mouse interface on a st...
Daniel Heckenberg, Brian Lovell
EUROPAR
2003
Springer
14 years 27 days ago
Delivering Data Management for Engineers on the Grid
Engineering design search and optimisation is a computationally expensive and data intensive process. Grid technology offers great potential to increase the efficiency of this proc...
Jasmin L. Wason, Marc Molinari, Zhuoan Jiao, Simon...