Sciweavers

434 search results - page 39 / 87
» The Case for Browser Provenance
Sort
View
SAGT
2009
Springer
177views Game Theory» more  SAGT 2009»
14 years 3 months ago
Characterizing Incentive Compatibility for Convex Valuations
We study implementability in dominant strategies of social choice functions when sets of types are multi-dimensional and convex, sets of outcomes are arbitrary, valuations for outc...
André Berger, Rudolf Müller, Seyed Hos...
TIT
2002
78views more  TIT 2002»
13 years 8 months ago
Tradeoffs between the excess-code-length exponent and the excess-distortion exponent in lossy source coding
Lossy compression of a discrete memoryless source (DMS) with respect to a single-letter distortion measure is considered. We study the best attainable tradeoff between the exponent...
Tsachy Weissman, Neri Merhav
WWW
2007
ACM
14 years 9 months ago
Exposing private information by timing web applications
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
Andrew Bortz, Dan Boneh
WWW
2003
ACM
14 years 9 months ago
Web-R: a Tool to Record & Replay Personal Web Navigation
This poster presents a useful tool to capture the content of browsing sessions. Web-R saves systematically all the components sufficient and necessary to visualize offline the pag...
Jean-Daniel Kant, Alain Lifchitz
AOSD
2009
ACM
14 years 3 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter