Sciweavers

103 search results - page 16 / 21
» Visible or invisible links
Sort
View
WWW
2006
ACM
14 years 9 months ago
Protecting browser state from web privacy attacks
Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users a...
Collin Jackson, Andrew Bortz, Dan Boneh, John C. M...
LOBJET
2006
196views more  LOBJET 2006»
13 years 8 months ago
Mapping High-Level Business Rules To and Through Aspects
Many object-oriented software applications contain implicit business rules. Although there exist many approaches that advocate the separation of rules, the rules' connections ...
María Agustina Cibrán, Maja D'Hondt,...
CHI
2009
ACM
14 years 9 months ago
Topology-aware navigation in large networks
Applications supporting navigation in large networks are used every days by millions of people. They include road map navigators, ight route visualization systems, and network vis...
Tomer Moscovich, Fanny Chevalier, Nathalie Henry, ...
CVPR
1999
IEEE
14 years 10 months ago
Bayesian Multi-Camera Surveillance
The task of multi-camera surveillance is to reconstruct the paths taken by all moving objects that are temporarily visible from multiple non-overlapping cameras. We present a Baye...
Vera Kettnaker, Ramin Zabih
ELPUB
2007
ACM
14 years 15 days ago
Beyond Publication - A Passage Through Project StORe
The principal aim of Project StORe is to provide middleware that will enable bi-directional links between source repositories of research data and the output repositories containi...
Graham Pryor