Sciweavers

CSE
2009
IEEE
14 years 6 months ago
Real World Routing Using Virtual World Information
—In this paper, we propose to leverage social graphs from Online Social Networks (OSN) to improve the forwarding efficiency of mobile networks, more particularly Delay Tolerant ...
Pan Hui, Nishanth R. Sastry
CSE
2009
IEEE
14 years 6 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
CSE
2009
IEEE
14 years 6 months ago
A Network-Aware Distributed Membership Protocol for Collaborative Defense
— To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly...
David Zage, Carl Livadas, Eve M. Schooler
CSE
2009
IEEE
14 years 6 months ago
Co-located Many-Player Gaming on Large High-Resolution Displays
David Machaj, Christopher Andrews, Chris North
CSE
2009
IEEE
14 years 6 months ago
Privacy Requirements in Vehicular Communication Systems
Abstract—A primary goal of vehicular communication systems is the enhancement of traffic safety by equipping vehicles with wireless communication units to facilitate cooperative...
Florian Schaub, Zhendong Ma, Frank Kargl
CSE
2009
IEEE
14 years 6 months ago
Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth Scans
—Modern consumer wireless devices are increasingly powerful, making them attractive to use as wireless sensor nodes. At the same time, many use protocol suites such as Bluetooth ...
David Evans, Robert H. Warren
CSE
2009
IEEE
14 years 6 months ago
Noise Injection for Search Privacy Protection
Abstract—Extensive work has been devoted to private information retrieval and privacy preserving data mining. To protect user privacy from search engines, however, most current a...
Shaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Ch...
CSE
2009
IEEE
14 years 6 months ago
FaceCloak: An Architecture for User Privacy on Social Networking Sites
—Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, pri...
Wanying Luo, Qi Xie, Urs Hengartner
CSE
2009
IEEE
14 years 6 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu
CSE
2009
IEEE
14 years 6 months ago
Large Online Social Footprints-An Emerging Threat
—We study large online social footprints by collecting data on 13,990 active users. After parsing data from 10 of the 15 most popular social networking sites, we find that a use...
Danesh Irani, Steve Webb, Kang Li, Calton Pu