Sciweavers

8243 search results - page 1584 / 1649
» Can We Manage Trust
Sort
View
WWW
2006
ACM
14 years 9 months ago
Protecting browser state from web privacy attacks
Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users a...
Collin Jackson, Andrew Bortz, Dan Boneh, John C. M...
WWW
2006
ACM
14 years 9 months ago
WS-replication: a framework for highly available web services
Due to the rapid acceptance of web services and its fast spreading, a number of mission-critical systems will be deployed as web services in next years. The availability of those ...
Jorge Salas, Francisco Perez-Sorrosal, Marta Pati&...
WWW
2004
ACM
14 years 9 months ago
RDFPeers: a scalable distributed RDF repository based on a structured peer-to-peer network
Centralized Resource Description Framework (RDF) repositories have limitations both in their failure tolerance and in their scalability. Existing Peer-to-Peer (P2P) RDF repositori...
Min Cai, Martin R. Frank
WWW
2003
ACM
14 years 9 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
CHI
2009
ACM
14 years 9 months ago
StoryTags: once upon a time, there was a photo
Nuno Tom?s Daniel Gon?alves With the growing volume of digital information users must deal with, management and retrieval tasks have become increasingly problematic. A popular way ...
Nuno Tomás, Tiago João Vieira Guerre...
« Prev « First page 1584 / 1649 Last » Next »