Sciweavers

650 search results - page 101 / 130
» Privacy in dynamic social networks
Sort
View
ICDM
2010
IEEE
212views Data Mining» more  ICDM 2010»
13 years 5 months ago
Modeling Information Diffusion in Implicit Networks
Social media forms a central domain for the production and dissemination of real-time information. Even though such flows of information have traditionally been thought of as diffu...
Jaewon Yang, Jure Leskovec
JSAC
2011
136views more  JSAC 2011»
12 years 10 months ago
Spectrum Trading in Cognitive Radio Networks: A Contract-Theoretic Modeling Approach
—Cognitive radio is a promising paradigm to achieve efficient utilization of spectrum resource by allowing the unlicensed users (i.e., secondary users, SUs) to access the licens...
Lin Gao, Xinbing Wang, Youyun Xu, Qian Zhang
CCS
2011
ACM
12 years 7 months ago
Automated black-box detection of side-channel vulnerabilities in web applications
Web applications divide their state between the client and the server. The frequent and highly dynamic client-server communication that is characteristic of modern web application...
Peter Chapman, David Evans
CODASPY
2011
12 years 11 months ago
Privacy-preserving activity scheduling on mobile devices
—Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users’ personal schedules. Users also access popular contextbase...
Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hu...
GIS
2008
ACM
14 years 8 months ago
Using tomography for ubiquitous sensing
By embedding sensors in mobile devices, it is possible to exploit the ubiquitous presence of these devices to construct applications for large-scale sensing and monitoring of envi...
Stacy Patterson, Bassam Bamieh, Amr El Abbadi