Sciweavers

650 search results - page 88 / 130
» Privacy in Non-private Environments
Sort
View
IJCAI
1997
13 years 10 months ago
Middle-Agents for the Internet
Like middle-men in physical commerce, middleagents support the flow of information in electronic commerce, assisting in locating and connecting the ultimate information provider ...
Keith Decker, Katia P. Sycara, Mike Williamson
CCS
2010
ACM
13 years 8 months ago
CRAFT: a new secure congestion control architecture
Congestion control algorithms seek to optimally utilize network resources by allocating a certain rate for each user. However, malicious clients can disregard the congestion contr...
Dongho Kim, Jerry T. Chiang, Yih-Chun Hu, Adrian P...
CORR
2006
Springer
91views Education» more  CORR 2006»
13 years 8 months ago
SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting
In the UNIX/Linux environment the kernel can log every command process created by every user using process accounting. This data has many potential uses, including the investigati...
Katherine Luo, Yifan Li, Charis Ermopoulos, Willia...
ISI
2008
Springer
13 years 8 months ago
Data mining for social network analysis
A social network is defined as a social structure of individuals, who are related (directly or indirectly to each other) based on a common relation of interest, e.g. friendship, t...
J. Srivastava
ISI
2006
Springer
13 years 8 months ago
Semantic Analytics Visualization
In this paper we present a new tool for semantic analytics through 3D visualization called "Semantic Analytics Visualization" (SAV). It has the capability for visualizing...
Leonidas Deligiannidis, Amit P. Sheth, Boanerges A...