Sciweavers

224 search results - page 35 / 45
» Syntactic Folding and its Application to the Information Ext...
Sort
View
DRM
2007
Springer
14 years 1 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
MMS
2006
13 years 7 months ago
A probabilistic semantic model for image annotation and multi-modal image retrieval
This paper addresses automatic image annotation problem and its application to multi-modal image retrieval. The contribution of our work is three-fold. (1) We propose a probabilis...
Ruofei Zhang, Zhongfei (Mark) Zhang, Mingjing Li, ...
ELPUB
1999
ACM
13 years 11 months ago
Classifying Technical Terms
Automating the process of term recognition and classiæcation is important for digital libraries. Automatic Term Recognition घATRङ has many applications in areas related to di...
Katerina T. Frantzi, Sophia Ananiadou, Jun-ichi Ts...
SIGIR
2005
ACM
14 years 1 months ago
A study of relevance propagation for web search
Different from traditional information retrieval, both content and structure are critical to the success of Web information retrieval. In recent years, many relevance propagation ...
Tao Qin, Tie-Yan Liu, Xu-Dong Zhang, Zheng Chen, W...
SAC
2006
ACM
14 years 1 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...