Sciweavers

170 search results - page 31 / 34
» A Practical Attack to De-anonymize Social Network Users
Sort
View
ACL
2010
13 years 5 months ago
A Unified Graph Model for Sentence-Based Opinion Retrieval
There is a growing research interest in opinion retrieval as on-line users' opinions are becoming more and more popular in business, social networks, etc. Practically speakin...
Binyang Li, Lanjun Zhou, Shi Feng, Kam-Fai Wong
HICSS
2000
IEEE
180views Biometrics» more  HICSS 2000»
14 years 16 hour ago
Evolving Use of a System for Education at a Distance
Computers and networks are increasingly able to support distributed collaborative multimedia applications. In fact, the growing interest in distance learning reflects the awarenes...
Stephen A. White, Anoop Gupta, Jonathan Grudin, Ha...
ICDE
2010
IEEE
399views Database» more  ICDE 2010»
14 years 2 months ago
Discovery-driven graph summarization
Abstract— Large graph datasets are ubiquitous in many domains, including social networking and biology. Graph summarization techniques are crucial in such domains as they can ass...
Ning Zhang, Yuanyuan Tian, Jignesh M. Patel
DRM
2006
Springer
13 years 11 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
ISCI
2010
146views more  ISCI 2010»
13 years 4 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...