Sciweavers

64 search results - page 10 / 13
» A comparative study of online privacy policies and formats
Sort
View
SASO
2008
IEEE
14 years 1 months ago
Market Formulation for Resources Allocation in an Ad-Hoc Grid
An ad hoc grid is a spontaneous formation of cooperating heterogenous computing nodes which attempts to provide computing resources on demand to every participant. In this paper, ...
Behnaz Pourebrahimi, Luc Onana Alima, Koen Bertels
SOFSEM
2010
Springer
14 years 4 months ago
Regret Minimization and Job Scheduling
Regret minimization has proven to be a very powerful tool in both computational learning theory and online algorithms. Regret minimization algorithms can guarantee, for a single de...
Yishay Mansour
CCS
2008
ACM
13 years 9 months ago
Spamalytics: an empirical analysis of spam marketing conversion
The "conversion rate" of spam -- the probability that an unsolicited e-mail will ultimately elicit a "sale" -- underlies the entire spam value proposition. How...
Chris Kanich, Christian Kreibich, Kirill Levchenko...
JIS
2010
91views more  JIS 2010»
13 years 2 months ago
Beyond vandalism: Wikipedia trolls
Research on trolls is scarce, but their activities challenge online communities; one of the main challenges of the Wikipedia community is to fight against v...
Pnina Shachaf, Noriko Hara
SPW
2000
Springer
13 years 11 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano