Sciweavers

784 search results - page 15 / 157
» What would they think
Sort
View
CCR
2007
94views more  CCR 2007»
13 years 7 months ago
You must be joking...: why Alice killed Bob
Humor is something that I take very seriously. Recently, I have been thinking a lot about it. It all started with a pet peeve of mine that got spurred on by a comment from a stude...
Michalis Faloutsos
CIKM
2007
Springer
14 years 1 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
USITS
2003
13 years 9 months ago
Why Do Internet Services Fail, and What Can Be Done About It?
In 1986 Jim Gray published his landmark study of the causes of failures of Tandem systems and the techniques Tandem used to prevent such failures [6]. Seventeen years later, Inter...
David L. Oppenheimer, Archana Ganapathi, David A. ...
ICALP
2007
Springer
14 years 1 months ago
A "proof-reading" of Some Issues in Cryptography
Abstract. In this paper, we identify some issues in the interplay between practice and theory in cryptography, issues that have repeatedly appeared in different incarnations over ...
Ivan Damgård
INTERACT
2007
13 years 9 months ago
Do I Do What I Say?: Observed Versus Stated Privacy Preferences
Abstract. This paper examines the use of surveys in measuring privacy concerns in ubiquitous computing environments. Two evaluation techniques are used to study the privacy concern...
Kay Connelly, Ashraf Khalil, Yong Liu