Sciweavers

1064 search results - page 182 / 213
» Cryptography from Anonymity
Sort
View
CCS
2010
ACM
13 years 9 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...
BMCBI
2006
92views more  BMCBI 2006»
13 years 9 months ago
Similarity-based gene detection: using COGs to find evolutionarily-conserved ORFs
Background: Experimental verification of gene products has not kept pace with the rapid growth of microbial sequence information. However, existing annotations of gene locations c...
Bradford C. Powell, Clyde A. Hutchison III
COGSCI
2004
105views more  COGSCI 2004»
13 years 9 months ago
Intention, interpretation and the computational structure of language
I show how a conversational process that takes simple, intuitively meaningful steps may be understood as a sophisticated computation that derives the richly detailed, complex repr...
Matthew Stone
WWW
2009
ACM
14 years 10 months ago
Releasing search queries and clicks privately
The question of how to publish an anonymized search log was brought to the forefront by a well-intentioned, but privacy-unaware AOL search log release. Since then a series of ad-h...
Aleksandra Korolova, Krishnaram Kenthapadi, Nina M...
WWW
2003
ACM
14 years 10 months ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...