Sciweavers

1557 search results - page 50 / 312
» What can we do with a Solution
Sort
View
WPES
2005
ACM
14 years 1 months ago
Determining user privacy preferences by asking the right questions: an automated approach
As the Internet becomes increasingly used for sensitive transactions, the need to protect user privacy becomes more and more important. One fundamental aspect of user privacy is t...
Keith Irwin, Ting Yu
FMCO
2005
Springer
153views Formal Methods» more  FMCO 2005»
14 years 1 months ago
Smallfoot: Modular Automatic Assertion Checking with Separation Logic
Abstract. Separation logic is a program logic for reasoning about programs that manipulate pointer data structures. We describe Smallfoot, a tool for checking certain lightweight s...
Josh Berdine, Cristiano Calcagno, Peter W. O'Hearn
MOBILWARE
2009
ACM
14 years 10 days ago
Trends in Mobile Application Development
Major software companies, such as Apple and Google, are disturbing the relatively safe and established actors of the mobile application business. These newcomers have caused signiï...
Adrian Holzer, Jan Ondrus
WWW
2009
ACM
14 years 8 months ago
RuralCafe: web search in the rural developing world
The majority of people in rural developing regions do not have access to the World Wide Web. Traditional network connectivity technologies have proven to be prohibitively expensiv...
Jay Chen, Lakshminarayanan Subramanian, Jinyang Li
ICDM
2008
IEEE
117views Data Mining» more  ICDM 2008»
14 years 2 months ago
RTM: Laws and a Recursive Generator for Weighted Time-Evolving Graphs
How do real, weighted graphs change over time? What patterns, if any, do they obey? Earlier studies focus on unweighted graphs, and, with few exceptions, they focus on static snap...
Leman Akoglu, Mary McGlohon, Christos Faloutsos