Discriminative models for multi-class object layout

C Desai, D Ramanan, CC Fowlkes - International journal of computer …, 2011 - Springer
Many state-of-the-art approaches for object recognition reduce the problem to a 0-1
classification task. This allows one to leverage sophisticated machine learning techniques …

[PDF][PDF] Collaboro: a collaborative (meta) modeling tool

JLC Izquierdo, J Cabot - PeerJ Computer Science, 2016 - peerj.com
Motivation Scientists increasingly rely on intelligent information systems to help them in their
daily tasks, in particular for managing research objects, like publications or datasets. The …

Mining sandboxes: Are we there yet?

L Bao, TDB Le, D Lo - 2018 IEEE 25th International Conference …, 2018 - ieeexplore.ieee.org
The popularity of Android platform on mobile devices has attracted much attention from
many developers and researchers, as well as malware writers. Recently, Jamrozik et al …

{ADsafety}:{Type-Based} Verification of {JavaScript} Sandboxing

JG Politz, SA Eliopoulos, A Guha… - 20th USENIX Security …, 2011 - usenix.org
Web sites routinely incorporate JavaScript programs from several sources into a single
page. These sources must be protected from one another, which requires robust …

{Lock-in-Pop}: Securing Privileged Operating System Kernels by Kee** on the Beaten Path

Y Li, B Dolan-Gavitt, S Weber, J Cappos - 2017 USENIX Annual …, 2017 - usenix.org
Virtual machines (VMs) that try to isolate untrusted code are widely used in practice.
However, it is often possible to trigger zero-day flaws in the host Operating System (OS) from …

A first look at vehicle data collection via smartphone sensors

M Reininger, S Miller, Y Zhuang… - 2015 IEEE Sensors …, 2015 - ieeexplore.ieee.org
Smartphones serve as a technical interface to the outside world. These devices have
embedded, on-board sensors (such as accelerometers, WiFi, and GPSes) that can provide …

Future Internet research and experimentation: The G-Lab approach

D Schwerdel, B Reuther, T Zinner, P Müller… - Computer Networks, 2014 - Elsevier
Abstract The German Lab (G-Lab) project aims to investigate architectural concepts and
technologies for a new inter-networking architecture as an integrated approach between …

Verifying web browser extensions' compliance with private-browsing mode

BS Lerner, L Elberty, N Poole… - … Security–ESORICS 2013 …, 2013 - Springer
Modern web browsers implement a private browsing mode that is intended to leave behind
no traces of a user's browsing activity on their computer. This feature is in direct tension with …

[HTML][HTML] A systematic analysis of the science of sandboxing

M Maass, A Sales, B Chung, J Sunshine - PeerJ Computer Science, 2016 - peerj.com
Sandboxes are increasingly important building materials for secure software systems. In
recognition of their potential to improve the security posture of many systems at various …

Methods of resetting passwords in network service systems including user redirection and related systems and computer-program products

S Morris, W Conner - US Patent 8,850,524, 2014 - Google Patents
Resetting a password for a network service account may include redirecting the user to a
password reset tool, wherein the user is blocked from network access other than the pass …