Sciweavers

1626 search results - page 66 / 326
» Computing the Types of the Relationships between Autonomous ...
Sort
View
ICFP
2010
ACM
13 years 9 months ago
Distance makes the types grow stronger: a calculus for differential privacy
We want assurances that sensitive information will not be disclosed when aggregate data derived from a database is published. Differential privacy offers a strong statistical guar...
Jason Reed, Benjamin C. Pierce
KDD
2009
ACM
227views Data Mining» more  KDD 2009»
14 years 9 months ago
User grouping behavior in online forums
Online forums represent one type of social media that is particularly rich for studying human behavior in information seeking and diffusing. The way users join communities is a re...
Xiaolin Shi, Jun Zhu, Rui Cai, Lei Zhang
CISIS
2009
IEEE
14 years 3 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
BIRTHDAY
2005
Springer
14 years 2 months ago
Flexible Interconnection of Graph Transformation Modules
Modularization is a well-known concept to structure software systems as well as their specifications. Modules are equipped with export and import interfaces and thus can be connec...
Gregor Engels, Reiko Heckel, Alexey Cherchago
CHI
2009
ACM
14 years 9 months ago
"It's like a circus in here!": affect and information sharing in an emergency department
The following research begins to address the relationship between affect and information sharing in order to inform the design of collaborative systems. Through ethnographic obser...
Helena M. Mentis, Mary Beth Rosson