Sciweavers

13214 search results - page 2641 / 2643
» Pseudorandomness for network algorithms
Sort
View
JCDL
2011
ACM
301views Education» more  JCDL 2011»
12 years 10 months ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski
CCS
2011
ACM
12 years 7 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
IHI
2012
217views Healthcare» more  IHI 2012»
12 years 3 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
INFOCOM
2012
IEEE
11 years 10 months ago
L2P2: Location-aware location privacy protection for location-based services
Abstract—Location privacy has been a serious concern for mobile users who use location-based services provided by the thirdparty provider via mobile networks. Recently, there hav...
Yu Wang 0003, Dingbang Xu, Xiao He, Chao Zhang, Fa...
ISSTA
2012
ACM
11 years 10 months ago
Finding errors in multithreaded GUI applications
To keep a Graphical User Interface (GUI) responsive and active, a GUI application often has a main UI thread (or event dispatching thread) and spawns separate threads to handle le...
Sai Zhang, Hao Lü, Michael D. Ernst
« Prev « First page 2641 / 2643 Last » Next »