Firefox 3.6

Known as: Mozilla Firefox 3.6 
Mozilla Firefox 3.6 is a version of the Firefox web browser released in January 2010. The release's main improvement over Firefox 3.5 is improved… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2005-2017
02420052017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
We present Tracking Protection in the Mozilla Firefox web browser. Tracking Protection is a new privacy technology to mitigate… (More)
  • figure 1
  • figure 2
  • figure 3
  • table II
  • table I
Is this relevant?
2014
2014
Most modern Web browsers export a rich API allowing third-party extensions to access privileged browser objects that can also be… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 5
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijacking attacks. However, performance and… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 5
Is this relevant?
2012
2012
In order to evaluate software performance and find regressions, many developers use automated performance tests. However, the… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2011
2011
Purpose – Expert and novice readers tag documents with different descriptions; this study is intended to discover which readers… (More)
  • figure 1
  • figure 2
  • table I
Is this relevant?
2011
2011
Trace compilation is a technique used by just-in-time (JIT) compilers such as TraceMonkey, the JavaScript engine in the Mozilla… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
Implementations of SSL/TLS in modern web browsers trust root certificate authorities (CAs) from many countries around the world… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2009
2009
We present Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
The area of visualization has always been one of the most attractive sections of network management technology. Successful… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We presentShadow Honeypots , a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?