Sciweavers

133 search results - page 17 / 27
» Search in social networks with access control
Sort
View
PET
2010
Springer
14 years 22 days ago
Private Information Disclosure from Web Searches
As the amount of personal information stored at remote service providers increases, so does the danger of data theft. When connections to remote services are made in the clear and ...
Claude Castelluccia, Emiliano De Cristofaro, Danie...
SIGCOMM
2009
ACM
14 years 3 months ago
In defense of wireless carrier sense
Carrier sense is often used to regulate concurrency in wireless medium access control (MAC) protocols, balancing interference protection and spatial reuse. Carrier sense is known ...
Micah Z. Brodsky, Robert T. Morris
ASSETS
2009
ACM
14 years 1 months ago
Better vocabularies for assistive communication aids: connecting terms using semantic networks and untrained annotators
The difficulties of navigating vocabulary in an assistive communication device are exacerbated for individuals with lexical access disorders like those due to aphasia. We present ...
Sonya S. Nikolova, Jordan L. Boyd-Graber, Christia...
DBKDA
2010
IEEE
127views Database» more  DBKDA 2010»
13 years 7 months ago
Failure-Tolerant Transaction Routing at Large Scale
—Emerging Web2.0 applications such as virtual worlds or social networking websites strongly differ from usual OLTP applications. First, the transactions are encapsulated in an AP...
Idrissa Sarr, Hubert Naacke, Stéphane Gan&c...
WWW
2009
ACM
14 years 9 months ago
QuWi: quality control in Wikipedia
We propose and evaluate QuWi (Quality in Wikipedia), a framework for quality control in Wikipedia. We build upon a previous proposal by Mizzaro [11], who proposed a method for sub...
Alberto Cusinato, Vincenzo Della Mea, Francesco Di...