Sciweavers

452 search results - page 67 / 91
» Exposing private information by timing web applications
Sort
View
GIS
2006
ACM
13 years 7 months ago
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desir...
Chi-Yin Chow, Mohamed F. Mokbel, Xuan Liu
SEMWEB
2010
Springer
13 years 5 months ago
Ontology Alignment for Linked Open Data
The Web of Data currently coming into existence through the Linked Open Data (LOD) effort is a major milestone in realizing the Semantic Web vision. However, the development of app...
Prateek Jain, Pascal Hitzler, Amit P. Sheth, Kunal...
CIKM
2007
Springer
14 years 1 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
ACMACE
2004
ACM
13 years 11 months ago
CamBall: augmented networked table tennis played with real rackets
We present a computer system for natural interaction in an augmented virtual environment, enabling people to play table tennis over Internet/LAN with real rackets. No special hard...
Charles Woodward, Petri Honkamaa, Jani Jäppin...
SCFBM
2008
104views more  SCFBM 2008»
13 years 7 months ago
A Perl toolkit for LIMS development
Background: High throughput laboratory techniques generate huge quantities of scientific data. Laboratory Information Management Systems (LIMS) are a necessary requirement, dealin...
James A. Morris, Simon A. Gayther, Ian J. Jacobs, ...