Sciweavers

3865 search results - page 140 / 773
» From Bidirectionality to Alternation
Sort
View
PERCOM
2011
ACM
14 years 8 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
CIKM
2011
Springer
14 years 4 months ago
A probabilistic method for inferring preferences from clicks
Evaluating rankers using implicit feedback, such as clicks on documents in a result list, is an increasingly popular alternative to traditional evaluation methods based on explici...
Katja Hofmann, Shimon Whiteson, Maarten de Rijke
DGO
2011
247views Education» more  DGO 2011»
14 years 4 months ago
Open government and e-government: democratic challenges from a public value perspective
We consider open government (OG) within the context of egovernment and its broader implications for the future of public administration. We argue that the current US Administratio...
Teresa M. Harrison, Santiago Guerrero, G. Brian Bu...
IACR
2011
125views more  IACR 2011»
14 years 4 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
DAC
1999
ACM
16 years 5 months ago
Representation of Function Variants for Embedded System Optimization and Synthesis
Many embedded systems are implemented with a set of alternative function variants to adapt the system to different applications or environments. This paper proposes a novel approa...
Dirk Ziegenbein, Jürgen Teich, Kai Richter, L...