Sciweavers

233 search results - page 45 / 47
» Distributed Privacy Preserving Information Sharing
Sort
View
KDD
2009
ACM
269views Data Mining» more  KDD 2009»
14 years 9 months ago
Extracting discriminative concepts for domain adaptation in text mining
One common predictive modeling challenge occurs in text mining problems is that the training data and the operational (testing) data are drawn from different underlying distributi...
Bo Chen, Wai Lam, Ivor Tsang, Tak-Lam Wong
ATAL
2009
Springer
13 years 9 months ago
Directing Status Messages to Their Audience in Online Communities
In this paper we present the results of our user study about status message sharing on the Social Web. The study revealed the privacy and information noise (sometimes originating f...
Milan Stankovic, Alexandre Passant, Philippe Laubl...
CCS
2007
ACM
14 years 2 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
PPSN
2004
Springer
14 years 1 months ago
Indicator-Based Selection in Multiobjective Search
Abstract. This paper discusses how preference information of the decision maker can in general be integrated into multiobjective search. The main idea is to first define the opti...
Eckart Zitzler, Simon Künzli
CCR
2007
119views more  CCR 2007»
13 years 8 months ago
Exploiting KAD: possible uses and misuses
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the total traffic seen in the Internet. The dominating ...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...