Sciweavers

6109 search results - page 1023 / 1222
» Ubiquitous Web Applications
Sort
View
ML
2010
ACM
185views Machine Learning» more  ML 2010»
14 years 11 months ago
Learning to rank on graphs
Graph representations of data are increasingly common. Such representations arise in a variety of applications, including computational biology, social network analysis, web applic...
Shivani Agarwal
TELSYS
2010
154views more  TELSYS 2010»
14 years 11 months ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert
144
Voted
DASFAA
2011
IEEE
177views Database» more  DASFAA 2011»
14 years 8 months ago
Optimizing Incremental Maintenance of Minimal Bisimulation of Cyclic Graphs
Abstract. Graph-structured databases have numerous recent applications including the Semantic Web, biological databases and XML, among many others. In this paper, we study the main...
Jintian Deng, Byron Choi, Jianliang Xu, Sourav S. ...
ESSOS
2011
Springer
14 years 8 months ago
SessionShield: Lightweight Protection against Session Hijacking
The class of Cross-site Scripting (XSS) vulnerabilities is the most prevalent security problem in the field of Web applications. One of the main attack vectors used in connection ...
Nick Nikiforakis, Wannes Meert, Yves Younan, Marti...
ICC
2011
IEEE
199views Communications» more  ICC 2011»
14 years 4 months ago
Equal-Sized Cells Mean Equal-Sized Packets in Tor?
Abstract—Tor is a well-known low-latency anonymous communication system. To prevent the traffic analysis attack, Tor packs application data into equal-sized cells. However, we f...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu
« Prev « First page 1023 / 1222 Last » Next »