Sciweavers

471 search results - page 56 / 95
» Social applications: exploring a more secure framework
Sort
View
SDM
2010
SIAM
256views Data Mining» more  SDM 2010»
13 years 9 months ago
The Application of Statistical Relational Learning to a Database of Criminal and Terrorist Activity
We apply statistical relational learning to a database of criminal and terrorist activity to predict attributes and event outcomes. The database stems from a collection of news ar...
B. Delaney, Andrew S. Fast, W. M. Campbell, C. J. ...
CCS
2008
ACM
13 years 9 months ago
Towards provable secure neighbor discovery in wireless networks
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocol...
Marcin Poturalski, Panagiotis Papadimitratos, Jean...
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
11 years 10 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
ICNP
2003
IEEE
14 years 1 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
BIS
2008
114views Business» more  BIS 2008»
13 years 9 months ago
Transforming Exchange-based Job Boards into Lasting Career Communities
Abstract. In this paper, we use a qualitative approach to explore which design aspects an erecruiting platform requires so as to achieve active long-term participation of its users...
Elfi Ettinger, Celeste Wilderom, Rolf Van Dick