Sciweavers

1834 search results - page 146 / 367
» Public Key Cryptography
Sort
View
JUCS
2008
120views more  JUCS 2008»
13 years 9 months ago
Publication Bias in the Computer Science Education Research Literature
Abstract: Publication bias is the tendency for investigations with primarily nonstatistically significant findings to be withheld from the research record. Because publication bias...
Justus J. Randolph, Roman Bednarik
CCGRID
2005
IEEE
14 years 3 months ago
Secret sequence comparison on public grid computing resources
Once a new gene has been sequenced, it must be verified whether or not it is similar to previously sequenced genes. In many cases, the organization that sequenced a potentially n...
Ken-ichi Kurata, Hiroshi Nakamura, Vincent Breton
ESA
2010
Springer
185views Algorithms» more  ESA 2010»
13 years 10 months ago
Fast Routing in Very Large Public Transportation Networks Using Transfer Patterns
We show how to route on very large public transportation networks (up to half a billion arcs) with average query times of a few milliseconds. We take into account many realistic fe...
Hannah Bast, Erik Carlsson, Arno Eigenwillig, Robe...
WWW
2009
ACM
14 years 10 months ago
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles
In order to address privacy concerns, many social media websites allow users to hide their personal profiles from the public. In this work, we show how an adversary can exploit an...
Elena Zheleva, Lise Getoor
ERCIMDL
2008
Springer
112views Education» more  ERCIMDL 2008»
13 years 11 months ago
Releasing the Power of Digital Metadata: Examining Large Networks of Co-related Publications
Bibliographic metadata plays a key role in scientific literature, not only to summarise and establish the facts of the publication record, but also to track citations between publ...
David Tarrant, Les Carr, Terry R. Payne