Sciweavers

172 search results - page 27 / 35
» Using a trust network to improve top-N recommendation
Sort
View
92
Voted
CSCW
2010
ACM
16 years 1 months ago
Making love in the network closet: the benefits and work of family videochat
In this paper, we explore the benefits of videochat for families and the corresponding work that home users engage in to make a video call run smoothly. We explore the varieties o...
Janet Go, Joseph Kaye, Mirjana Spasojevic, Morgan ...
CONEXT
2006
ACM
15 years 6 months ago
Optimal design of high density 802.11 WLANs
Abstract: The provisioning of high throughput performance infrastructure wireless networks necessitates the deployment of a high density of Access Points. While the latter improves...
Vivek P. Mhatre, Konstantina Papagiannaki
159
Voted
CCS
2008
ACM
15 years 6 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
IPOM
2009
Springer
15 years 9 months ago
An IPSec Mediation Approach for Safe Establishment of Inter-domain VPNs
In this paper we propose a new solution to increase the security of BGP/MPLS IP VPNs established across multiple domains. In general, layer 3 VPNs already present a number of secur...
Alexandre Matos, Fernando Matos, Paulo Simõ...
IEEESP
2010
101views more  IEEESP 2010»
15 years 3 months ago
Preserving Privacy Based on Semantic Policy Tools
Abstract—Private data of individuals is constantly being collected, analyzed, and stored by different kinds of organizations: shopping sites to provide better service and recomme...
Lalana Kagal, Joe Pato