Sciweavers

172 search results - page 27 / 35
» Using a trust network to improve top-N recommendation
Sort
View
CSCW
2010
ACM
14 years 5 months ago
Making love in the network closet: the benefits and work of family videochat
In this paper, we explore the benefits of videochat for families and the corresponding work that home users engage in to make a video call run smoothly. We explore the varieties o...
Janet Go, Joseph Kaye, Mirjana Spasojevic, Morgan ...
CONEXT
2006
ACM
13 years 10 months ago
Optimal design of high density 802.11 WLANs
Abstract: The provisioning of high throughput performance infrastructure wireless networks necessitates the deployment of a high density of Access Points. While the latter improves...
Vivek P. Mhatre, Konstantina Papagiannaki
CCS
2008
ACM
13 years 10 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
IPOM
2009
Springer
14 years 1 months ago
An IPSec Mediation Approach for Safe Establishment of Inter-domain VPNs
In this paper we propose a new solution to increase the security of BGP/MPLS IP VPNs established across multiple domains. In general, layer 3 VPNs already present a number of secur...
Alexandre Matos, Fernando Matos, Paulo Simõ...
IEEESP
2010
101views more  IEEESP 2010»
13 years 7 months ago
Preserving Privacy Based on Semantic Policy Tools
Abstract—Private data of individuals is constantly being collected, analyzed, and stored by different kinds of organizations: shopping sites to provide better service and recomme...
Lalana Kagal, Joe Pato