Sciweavers

162 search results - page 19 / 33
» Securing Email Archives through User Modeling
Sort
View
CHI
2006
ACM
14 years 7 months ago
Fast, flexible filtering with phlat
Systems for fast search of personal information are rapidly becoming ubiquitous. Such systems promise to dramatically improve personal information management, yet most are modeled...
Edward Cutrell, Daniel C. Robbins, Susan T. Dumais...
AGENTS
2001
Springer
14 years 3 hour ago
Trust-based facilitator for e-partnerships
In this paper, we propose a facilitator that finds capable and trustworthy partners on behalf of client users, which helps users form and maintain e-partnerships for electronic co...
Chihiro Ono, Boyd C. Paulson Jr., Dai Kanetomo, Ma...
ASIACRYPT
2001
Springer
14 years 1 hour ago
How to Leak a Secret
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signatu...
Ronald L. Rivest, Adi Shamir, Yael Tauman
ERCIMDL
2010
Springer
163views Education» more  ERCIMDL 2010»
13 years 8 months ago
Determining Time of Queries for Re-ranking Search Results
Abstract. Recent work on analyzing query logs shows that a significant fraction of queries are temporal, i.e., relevancy is dependent on time, and temporal queries play an importan...
Nattiya Kanhabua, Kjetil Nørvåg
CCS
2010
ACM
13 years 6 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov