Sciweavers

2821 search results - page 118 / 565
» Tracing a single user
Sort
View
MIDDLEWARE
2007
Springer
14 years 3 months ago
Correlation-Based Content Adaptation for Mobile Web Browsing
The resource impoverished environment on mobile devices results in a poor experience for users browsing the World Wide Web. Proxy-based middleware that transform content on the fl...
Iqbal Mohomed, Adin Scannell, Nilton Bila, Jin Zha...
HUC
2010
Springer
13 years 10 months ago
Bridging the gap between physical location and online social networks
This paper examines the location traces of 489 users of a location sharing social network for relationships between the users' mobility patterns and structural properties of ...
Justin Cranshaw, Eran Toch, Jason I. Hong, Aniket ...
PVLDB
2010
102views more  PVLDB 2010»
13 years 8 months ago
SQL QueRIE Recommendations
This demonstration presents QueRIE, a recommender system that supports interactive database exploration. This system aims at assisting non-expert users of scientific databases by...
Javad Akbarnejad, Gloria Chatzopoulou, Magdalini E...
ACSAC
2006
IEEE
14 years 3 months ago
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy
In this paper we examine the problem of entering sensitive data, such as passwords, from an untrusted machine. By untrusted we mean that it is suspected to be infected with spywar...
Dinei A. F. Florêncio, Cormac Herley
SIGSOFT
2007
ACM
14 years 10 months ago
State space exploration using feedback constraint generation and Monte-Carlo sampling
The systematic exploration of the space of all the behaviours of a software system forms the basis of numerous approaches to verification. However, existing approaches face many c...
Sriram Sankaranarayanan, Richard M. Chang, Guofei ...