Sciweavers

19003 search results - page 163 / 3801
» We Need Assurance!
Sort
View
MEDIAFORENSICS
2010
13 years 10 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
AVI
2004
13 years 10 months ago
Fishnet, a fisheye web browser with search term popouts: a comparative evaluation with overview and linear view
Fishnet is a web browser that always displays web pages in their entirety, independent of their size. Fishnet accomplishes this by using a fisheye view, i.e. by showing a focus re...
Patrick Baudisch, Bongshin Lee, Libby Hanna
IANDC
2008
128views more  IANDC 2008»
13 years 9 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 9 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
ERCIMDL
2010
Springer
126views Education» more  ERCIMDL 2010»
13 years 7 months ago
Uncovering Hidden Qualities - Benefits of Quality Measures for Automatically Generated Metadata
Abstract. Today, digital libraries more and more have to rely on semantic techniques during the workflows of metadata generation, search and navigational access. But, due to the st...
Sascha Tönnies, Wolf-Tilo Balke