Sciweavers

170 search results - page 32 / 34
» A Practical Attack to De-anonymize Social Network Users
Sort
View
SIGCOMM
2004
ACM
13 years 11 months ago
A first-principles approach to understanding the internet's router-level topology
A detailed understanding of the many facets of the Internet’s topological structure is critical for evaluating the performance of networking protocols, for assessing the effecti...
Lun Li, David Alderson, Walter Willinger, John Doy...
CODASPY
2011
12 years 9 months ago
Privacy-preserving activity scheduling on mobile devices
—Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users’ personal schedules. Users also access popular contextbase...
Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hu...
CHI
2005
ACM
14 years 6 months ago
DeDe: design and evaluation of a context-enhanced mobile messaging system
This paper presents the design, implementation and validation of an enhanced mobile phone messaging system (DeDe), allowing the sender to define the context in which the message w...
Younghee Jung, Per Persson, Jan Blom
APCCM
2008
13 years 7 months ago
Survey of Existing Languages to Model Interactive Web Applications
Over the last few years, the web is establishing increased importance in society with the rise of social networking sites and the semantic web, facilitated and driven by the popul...
Jevon M. Wright, Jens Dietrich
SIGCSE
2010
ACM
203views Education» more  SIGCSE 2010»
13 years 6 months ago
An approach to integrating ICTD projects into an undergraduate curriculum
Applying information and communication technologies to development (ICTD) is emerging as an interesting and motivating research area in computer science and engineering. It spans ...
Richard J. Anderson, Ruth E. Anderson, Gaetano Bor...