Sciweavers

133 search results - page 22 / 27
» Search in social networks with access control
Sort
View
IWDC
2005
Springer
117views Communications» more  IWDC 2005»
14 years 2 months ago
Oasis: A Hierarchical EMST Based P2P Network
Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems and ...
Pankaj Ghanshani, Tarun Bansal
JNW
2006
120views more  JNW 2006»
13 years 8 months ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
VLDB
2009
ACM
147views Database» more  VLDB 2009»
14 years 9 months ago
Privacy-preserving indexing of documents on the network
We address the problem of providing privacypreserving search over distributed accesscontrolled content. Indexed documents can be easily reconstructed from conventional (inverted) ...
Mayank Bawa, Rakesh Agrawal, Roberto J. Bayardo Jr...
SIGCOMM
2009
ACM
14 years 3 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
KDD
2012
ACM
190views Data Mining» more  KDD 2012»
11 years 11 months ago
The untold story of the clones: content-agnostic factors that impact YouTube video popularity
Video dissemination through sites such as YouTube can have widespread impacts on opinions, thoughts, and cultures. Not all videos will reach the same popularity and have the same ...
Youmna Borghol, Sebastien Ardon, Niklas Carlsson, ...