Sciweavers

37 search results - page 7 / 8
» User Modeling Combining Access Logs, Page Content and Semant...
Sort
View
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
13 years 11 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
TKDE
2008
122views more  TKDE 2008»
13 years 7 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
BMCBI
2007
109views more  BMCBI 2007»
13 years 7 months ago
Seahawk: moving beyond HTML in Web-based bioinformatics analysis
Background: Traditional HTML interfaces for input to and output from Bioinformatics analysis on the Web are highly variable in style, content and data formats. Combining multiple ...
Paul M. K. Gordon, Christoph W. Sensen
CIKM
2008
Springer
13 years 9 months ago
A language for manipulating clustered web documents results
We propose a novel conception language for exploring the results retrieved by several internet search services (like search engines) that cluster retrieved documents. The goal is ...
Gloria Bordogna, Alessandro Campi, Giuseppe Psaila...
WWW
2004
ACM
14 years 8 months ago
An xpath-based discourse analysis module for spoken dialogue systems
This paper describes an XPath-based discourse analysis module for Spoken Dialogue Systems that allows the dialogue author to easily manipulate and query both the user input's...
Giuseppe Di Fabbrizio, Charles Lewis