Sciweavers

776 search results - page 121 / 156
» Securing user inputs for the web
Sort
View
JAIR
2011
144views more  JAIR 2011»
13 years 3 months ago
Non-Deterministic Policies in Markovian Decision Processes
Markovian processes have long been used to model stochastic environments. Reinforcement learning has emerged as a framework to solve sequential planning and decision-making proble...
Mahdi Milani Fard, Joelle Pineau
SEMCO
2007
IEEE
14 years 3 months ago
A Semantic Matching Algorithm for Discovery in UDDI
One of the key objectives of web service technology is to construct processes that enable service providers to inter-connect with their clients. The industry has developed the UDD...
Unai Aguilera, Joseba Abaitua, Josuka Diaz, David ...
CCS
2006
ACM
14 years 17 days ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
ISM
2006
IEEE
104views Multimedia» more  ISM 2006»
14 years 2 months ago
A Novel Invisible Color Image Watermarking Scheme Using Image Adaptive Watermark Creation and Robust Insertion-Extraction
In this paper we present a robust and novel strategic invisible approach for insertion-extraction of a digital watermark, a color image, into color images. The novelty of our sche...
Saraju P. Mohanty, Parthasarathy Guturu, Elias Kou...
ACSAC
2008
IEEE
14 years 3 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh