Sciweavers

418 search results - page 57 / 84
» Security Associations in Personal Networks: A Comparative An...
Sort
View
MM
2009
ACM
277views Multimedia» more  MM 2009»
14 years 2 months ago
Inferring semantic concepts from community-contributed images and noisy tags
In this paper, we exploit the problem of inferring images’ semantic concepts from community-contributed images and their associated noisy tags. To infer the concepts more accura...
Jinhui Tang, Shuicheng Yan, Richang Hong, Guo-Jun ...
RECOMB
2005
Springer
14 years 8 months ago
Comparison of Protein-Protein Interaction Confidence Assignment Schemes
Recent technological advances have enabled high-throughput measurements of protein-protein interactions in the cell, producing protein interaction networks for various species at a...
Silpa Suthram, Tomer Shlomi, Eytan Ruppin, Roded S...
ACSAC
2005
IEEE
14 years 1 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
ASUNAM
2011
IEEE
12 years 8 months ago
Co-author Relationship Prediction in Heterogeneous Bibliographic Networks
—The problem of predicting links or interactions between objects in a network, is an important task in network analysis. Along this line, link prediction between co-authors in a ...
Yizhou Sun, Rick Barber, Manish Gupta, Charu C. Ag...
CCS
2007
ACM
14 years 2 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...