Sciweavers

15379 search results - page 214 / 3076
» Protecting users from
Sort
View
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
14 years 8 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
PCM
2009
Springer
114views Multimedia» more  PCM 2009»
14 years 20 days ago
Improving a Digital Rights Management Scheme for Video Broadcast
The security of content distribution is a critical issue that all the content providers have to treat seriously in order to guarantee their business. Emmanuel and Kankanhalli propo...
Yongdong Wu, Feng Bao
CIKM
2008
Springer
13 years 10 months ago
Predicting web spam with HTTP session information
Web spam is a widely-recognized threat to the quality and security of the Web. Web spam pages pollute search engine indexes, burden Web crawlers and Web mining services, and expos...
Steve Webb, James Caverlee, Calton Pu
COOPIS
2004
IEEE
13 years 12 months ago
Learning Classifiers from Semantically Heterogeneous Data
Semantically heterogeneous and distributed data sources are quite common in several application domains such as bioinformatics and security informatics. In such a setting, each dat...
Doina Caragea, Jyotishman Pathak, Vasant Honavar
DARE
2000
77views more  DARE 2000»
13 years 9 months ago
In search of metaphors for tangible user intefaces
: In this paper, we seek to identify interesting sources of metaphor for tangible user interfaces (TUIs). We begin by doing a systematic exploration of the design space that result...
Dag Svanaes, William Verplank