Sciweavers

677 search results - page 109 / 136
» Privacy-preserving data integration and sharing
Sort
View
CCS
2009
ACM
14 years 4 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon
ICRA
2008
IEEE
108views Robotics» more  ICRA 2008»
14 years 4 months ago
Detecting structural ambiguities and transitions during a guided tour
— Service robots designed for domestic settings need to navigate in an environment that they have to share with their users. Thus, they have to be able to report their current st...
Elin Anna Topp, Henrik I. Christensen
ICCSA
2007
Springer
14 years 3 months ago
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secre...
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...
SEMWEB
2007
Springer
14 years 3 months ago
Ontology Mapping - a User Survey
Ontology mapping is the key to data interoperability in the semantic web vision. Computing mappings is the first step to applications such as query rewriting, instance sharing, we...
Sean M. Falconer, Natalya Fridman Noy, Margaret-An...
CCGRID
2006
IEEE
14 years 3 months ago
Network Bandwidth Predictor (NBP): A System for Online Network performance Forecasting
The applicability of network-based computing depends on the availability of the underlying network bandwidth. However, network resources are shared and the available network bandw...
Alaknantha Eswaradass, Xian-He Sun, Ming Wu