Sciweavers

759 search results - page 20 / 152
» What Can Be Implemented Anonymously
Sort
View
SOCIALCOM
2010
13 years 7 months ago
A Private and Reliable Recommendation System for Social Networks
Abstract--With the proliferation of internet-based social networks into our lives, new mechanisms to control the release and use of personal data are required. As a step toward thi...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
FORMATS
2005
Springer
14 years 3 months ago
Implementation of Timed Automata: An Issue of Semantics or Modeling?
Abstract. We examine to what extent implementation of timed automata can be achieved using the standard semantics and appropriate modeling, instead of introducing new semantics. We...
Karine Altisen, Stavros Tripakis
PERCOM
2008
ACM
14 years 9 months ago
Composition and Generalization of Context Data for Privacy Preservation
This paper presents preliminary results on anonymization and obfuscation techniques to preserve users' privacy in context-aware service provisioning. The techniques are based...
Linda Pareschi, Daniele Riboni, Alessandra Agostin...
MICS
2008
108views more  MICS 2008»
13 years 9 months ago
Efficient Intensional Implementation for Lazy Functional Languages
The intensional transformation is a technique that can be used in order to eliminate higher-order functions from a functional program by introducing appropriate context manipulatio...
Angelos Charalambidis, Athanasios Grivas, Nikolaos...
IIWAS
2007
13 years 11 months ago
Implementing Semantic Interoperability in Electronic Auctions
Electronic marketplaces can provide several types of business processes depending upon their target audience. A form of such processes is electronic auction. It is a system for ac...
Juha Puustjärvi