搜索结果: 76-90 共查到“计算机科学技术 WEB”相关记录809条 . 查询时间(0.156 秒)
重庆大学软件学院Web开发技术课件第3章 HTML基础与层叠样式单CSS。
重庆大学软件学院Web开发技术课件第2章 WEB开发环境的建立
重庆大学软件学院 Web开发技术 课件 第2章 WEB开发环境的建立
2015/12/16
重庆大学软件学院Web开发技术课件第2章 WEB开发环境的建立。
重庆大学软件学院Web开发技术课件第1章 WEB开发技术概述。
由中国人民大学牵头承担的国家863计划项目《开放环境下海量web数据提取、集成、分析和管理系统平台与应用》通过验收(图)
中国人民大学 国家863计划项目 开放环境下海量web数据提取、集成、分析和管理系统平台与应用
2015/11/17
2015年11月12日,由国家863计划信息技术领域办公室组织的验收专家组,对由中国人民大学牵头承担的国家863计划项目《开放环境下海量web数据提取、集成、分析和管理系统平台与应用》进行了现场验收。验收专家组由10位专家组成,上海交通大学副校长梅宏院士任组长,副组长为该项目责任专家、哈尔滨工业大学左德承教授。
Experimenting with Museum and User Friendly Video Files Distribution Platform on the Web "Volumeone"
Web based video-casting MP4 FLV Web 2.0 intermediary User-oriented
2015/11/11
The platform now called “VOLUMEZERO” (http://www.volumezero.jp) was introduced by a team led by Prof. Junko IWABUCHI of Research Institute for Digital Media and Content, Keio University, Tokyo, Japan ...
Researchers Find Vulnerabilities in Use of Certificates for Web Security
Researchers Vulnerabilities in Use of Certificates Web Security
2015/11/12
Consumers use the Internet for banking, emailing, shopping and much more nowadays. With so much personal and private information being transmitted over the Web, Internet users must be able to rely on ...
数字时代隐私和监控的双重困境: 组织传播在Web 2.0时代下的思考
Web 2.0 信息技术 数字时代
2015/9/21
Web 2.0时代的各类信息技术给隐私与监控这两个互相竞争与依存的概念带来了挑战。了解这些挑战必须首先从历史的角度理解这两个概念在东西方的不同解读。其次,随着各类信息技术的发展,现代组织对其成员的监控行为渗透到各个方面,从而导致在工作场所中这两个概念的矛盾日益加深,这一现象值得深入研究。已有相关理论文献及数据报告显示:在数字时代,组织监控的概念需要被重新审视,因为传统意义上的垂直监视呈逐渐扁平化的...
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts and constant size private keys. More precisely, let N be the total number of users. Our system generate...
Private Web Search
Private Web Search response
2015/8/5
Web search is currently a source of growing concern about personal privacy. It is an essential and central part of most users� activity online and therefore one through which a significant amou...
Exposing private information by timing web applications
web applications private information
2015/8/5
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing directly measures response times from a we...
XCS: cross channel scripting and its impact on web applications
web applications channel scripting
2015/8/5
We study the security of embedded web servers used in con- sumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access points and lights-out...
XCS: cross channel scripting and its impact on web applications
web applications channel scripting
2015/8/5
We study the security of embedded web servers used in con- sumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access points and lights-out...
SessionJuggler: Secure Web Login From an Untrusted Terminal Using Session Hijacking
Untrusted Terminal Secure Web Login From
2015/8/5
We use modern features of web browsers to develop a secure login system from an untrusted terminal. The system, called SessionJuggler, requires no server-side changes and no special software on the te...
Intelligent Self-Repairable Web Wrappers
Web data extraction wrappers automatic adaptation
2015/7/21
The amount of information available on the Web grows at an incredible high rate. Systems and procedures devised to extract these data from Web sources already exist, and different approaches and techn...
A Web Smart Space Framework for Intelligent Search Engines
Search Engine Preprocessing Natural Language Processing Web Smart Space
2015/7/21
A web smart space is an intelligent environment which has additional capability of searching the information smartly and efficiently. New advancements like dynamic web contents generation has increase...