Sciweavers

1317 search results - page 244 / 264
» A New Design for a Practical Secure Cookies System
Sort
View
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
14 years 9 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
ICCAD
1997
IEEE
76views Hardware» more  ICCAD 1997»
14 years 21 days ago
Simulation methods for RF integrated circuits
Abstract — The principles employed in the development of modern RF simulators are introduced and the various techniques currently in use, or expected to be in use in the next few...
Kenneth S. Kundert
WWW
2008
ACM
14 years 9 months ago
Organizing and sharing distributed personal web-service data
The migration from desktop applications to Web-based services is scattering personal data across a myriad of Web sites, such as Google, Flickr, YouTube, and Amazon S3. This disper...
Roxana Geambasu, Cherie Cheung, Alexander Moshchuk...
EUROSYS
2009
ACM
14 years 3 months ago
SnowFlock: rapid virtual machine cloning for cloud computing
Virtual Machine (VM) fork is a new cloud computing abstraction that instantaneously clones a VM into multiple replicas running on different hosts. All replicas share the same init...
Horacio Andrés Lagar-Cavilla, Joseph Andrew...
KDD
2005
ACM
107views Data Mining» more  KDD 2005»
14 years 2 months ago
Predicting the product purchase patterns of corporate customers
This paper describes TIPPPS (Time Interleaved Product Purchase Prediction System), which analyses billing data of corporate customers in a large telecommunications company in orde...
Bhavani Raskutti, Alan Herschtal