Sciweavers

11016 search results - page 1861 / 2204
» Digital Information Retrieval
Sort
View
CCS
2010
ACM
15 years 4 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
WISEC
2010
ACM
15 years 4 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
CCR
2010
184views more  CCR 2010»
15 years 4 months ago
Characterising temporal distance and reachability in mobile and online social networks
The analysis of social and technological networks has attracted a lot of attention as social networking applications and mobile sensing devices have given us a wealth of real data...
John Tang, Mirco Musolesi, Cecilia Mascolo, Vito L...
FIRSTMONDAY
2007
141views more  FIRSTMONDAY 2007»
15 years 4 months ago
Scholarly publishing in sub-Saharan Africa in the twenty-first century: Challenges and opportunities
A free flow of ideas and information is vital to the process of scientific inquiry, and in turn to the ability to address economic, environmental and social development issues bot...
Ezra Ondari-Okemwa
CIKM
2010
Springer
15 years 3 months ago
Building re-usable dictionary repositories for real-world text mining
Text mining, though still a nascent industry, has been growing quickly along with the awareness of the importance of unstructured data in business analytics, customer retention an...
Shantanu Godbole, Indrajit Bhattacharya, Ajay Gupt...
« Prev « First page 1861 / 2204 Last » Next »