Sciweavers

4201 search results - page 137 / 841
» Our Users have Root!
Sort
View
PERCOM
2009
ACM
14 years 3 months ago
A Distributed k-Anonymity Protocol for Location Privacy
To benefit from a location-based service, a person must reveal her location to the service. However, knowing the person’s location might allow the service to re-identify the pe...
Ge Zhong, Urs Hengartner
FASE
2009
Springer
14 years 3 months ago
SNIFF: A Search Engine for Java Using Free-Form Queries
Reuse of existing libraries simplifies software development efforts. However, these libraries are often complex and reusing the APIs in the libraries involves a steep learning cu...
Shaunak Chatterjee, Sudeep Juvekar, Koushik Sen
ICC
2007
IEEE
170views Communications» more  ICC 2007»
14 years 2 months ago
Policy-Based QoS-Aware Packet Scheduling for CDMA 1x Ev-DO
— CDMA 1x Ev-DO is an evolution of the CDMA2000 3G wireless standard to enable high rate packet data services up to 2.4Mbps in Rev 0, 3.1Mbps in Rev A, and 4.9Mbps in Rev B. To s...
Jinho Hwang, M. Tamer Refaei, Hyeong-Ah Choi, Jae-...
IUI
2006
ACM
14 years 2 months ago
Linking messages and form requests
Large organizations with sophisticated infrastructures have large form-based systems that manage the interaction between the user community and the infrastructure. In many cases, ...
Anthony Tomasic, John Zimmerman, Isaac Simmons
MC
2001
13 years 9 months ago
Towards a Task-Based System Administration Tool for Linux Systems
The growing popularity of computers in all areas of daily life leads to the situation that an increasing number of people with diverse know-how of computers and software use these...
Ernianti Hasibuan, Gerd Szwillus