Sciweavers

3418 search results - page 627 / 684
» Security for Grid Services
Sort
View
AIRWEB
2009
Springer
14 years 3 months ago
Social spam detection
The popularity of social bookmarking sites has made them prime targets for spammers. Many of these systems require an administrator’s time and energy to manually filter or remo...
Benjamin Markines, Ciro Cattuto, Filippo Menczer
WASA
2009
Springer
107views Algorithms» more  WASA 2009»
14 years 3 months ago
Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks
Abstract. Increasingly ubiquitous wireless technologies require novel localization techniques to pinpoint the position of an uncooperative node, whether the target be a malicious d...
Christine Laurendeau, Michel Barbeau
DRM
2009
Springer
14 years 3 months ago
An implementation experience of domain management in marlin
Digital Rights Management (DRM) is used to protect copyrighted content from unauthorized use. However, this has taken away the jurisdiction of the consumers over their purchased c...
Sye Loong Keoh, Koen Vrielink
LOCA
2009
Springer
14 years 3 months ago
Bluetooth Tracking without Discoverability
Outdoor location-based services are now prevalent due to advances in mobile technology and GPS. Indoors, however, even coarse location remains unavailable. Bluetooth has been ident...
Simon Hay, Robert Harle
SIGCOMM
2009
ACM
14 years 3 months ago
PathForge: faithful anonymization of movement data
For most mobile networks, providers need the current position of their users to provide efficient service. The resulting motion data is not only an invaluable source for analyzing...
Sebastian Kay Belle, Marcel Waldvogel, Oliver Haas...