Sciweavers

1816 search results - page 316 / 364
» Trace oblivious computation
Sort
View
SDM
2007
SIAM
143views Data Mining» more  SDM 2007»
13 years 10 months ago
Less is More: Compact Matrix Decomposition for Large Sparse Graphs
Given a large sparse graph, how can we find patterns and anomalies? Several important applications can be modeled as large sparse graphs, e.g., network traffic monitoring, resea...
Jimeng Sun, Yinglian Xie, Hui Zhang, Christos Falo...
CONEXT
2009
ACM
13 years 9 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
CONEXT
2009
ACM
13 years 9 months ago
The age of impatience: optimal replication schemes for opportunistic networks
: We study mobile P2P content dissemination schemes which leverage the local dedicated caches provided by hand-held devices (e.g., smart-phones, PDAs) and opportunistic contacts be...
Joshua Reich, Augustin Chaintreau
CONEXT
2009
ACM
13 years 9 months ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
CGA
2004
13 years 8 months ago
Browsers to Support Awareness and Social Interaction
feel abstract and informational rather than inviting for social interaction. Consequently, newcomers and occasional visitors to such sites cannot quickly assess who the participant...
Alison Lee, Andreas Girgensohn, Jun Zhang