Discriminative models for multi-class object layout
Many state-of-the-art approaches for object recognition reduce the problem to a 0-1
classification task. This allows one to leverage sophisticated machine learning techniques …
classification task. This allows one to leverage sophisticated machine learning techniques …
[PDF][PDF] Collaboro: a collaborative (meta) modeling tool
Motivation Scientists increasingly rely on intelligent information systems to help them in their
daily tasks, in particular for managing research objects, like publications or datasets. The …
daily tasks, in particular for managing research objects, like publications or datasets. The …
Mining sandboxes: Are we there yet?
The popularity of Android platform on mobile devices has attracted much attention from
many developers and researchers, as well as malware writers. Recently, Jamrozik et al …
many developers and researchers, as well as malware writers. Recently, Jamrozik et al …
{ADsafety}:{Type-Based} Verification of {JavaScript} Sandboxing
Web sites routinely incorporate JavaScript programs from several sources into a single
page. These sources must be protected from one another, which requires robust …
page. These sources must be protected from one another, which requires robust …
{Lock-in-Pop}: Securing Privileged Operating System Kernels by Kee** on the Beaten Path
Virtual machines (VMs) that try to isolate untrusted code are widely used in practice.
However, it is often possible to trigger zero-day flaws in the host Operating System (OS) from …
However, it is often possible to trigger zero-day flaws in the host Operating System (OS) from …
A first look at vehicle data collection via smartphone sensors
M Reininger, S Miller, Y Zhuang… - 2015 IEEE Sensors …, 2015 - ieeexplore.ieee.org
Smartphones serve as a technical interface to the outside world. These devices have
embedded, on-board sensors (such as accelerometers, WiFi, and GPSes) that can provide …
embedded, on-board sensors (such as accelerometers, WiFi, and GPSes) that can provide …
Future Internet research and experimentation: The G-Lab approach
Abstract The German Lab (G-Lab) project aims to investigate architectural concepts and
technologies for a new inter-networking architecture as an integrated approach between …
technologies for a new inter-networking architecture as an integrated approach between …
Verifying web browser extensions' compliance with private-browsing mode
BS Lerner, L Elberty, N Poole… - … Security–ESORICS 2013 …, 2013 - Springer
Modern web browsers implement a private browsing mode that is intended to leave behind
no traces of a user's browsing activity on their computer. This feature is in direct tension with …
no traces of a user's browsing activity on their computer. This feature is in direct tension with …
[HTML][HTML] A systematic analysis of the science of sandboxing
Sandboxes are increasingly important building materials for secure software systems. In
recognition of their potential to improve the security posture of many systems at various …
recognition of their potential to improve the security posture of many systems at various …
Methods of resetting passwords in network service systems including user redirection and related systems and computer-program products
S Morris, W Conner - US Patent 8,850,524, 2014 - Google Patents
Resetting a password for a network service account may include redirecting the user to a
password reset tool, wherein the user is blocked from network access other than the pass …
password reset tool, wherein the user is blocked from network access other than the pass …