Sciweavers

436 search results - page 87 / 88
» Arguing for gaining access to information
Sort
View
INFOCOM
2010
IEEE
13 years 4 months ago
ISP-Enabled Behavioral Ad Targeting without Deep Packet Inspection
—Online advertising is a rapidly growing industry currently dominated by the search engine ’giant’ Google. In an attempt to tap into this huge market, Internet Service Provid...
Gabriel Maciá-Fernández, Yong Wang, ...
HCI
2009
13 years 3 months ago
User Interface Adaptation of Web-Based Services on the Semantic Web
Abstract. The Web is constantly evolving into an unprecedented and continuously growing source of knowledge, information and services, potentially accessed at by anyone anytime, an...
Nikolaos Partarakis, Constantina Doulgeraki, Aster...
TON
2010
136views more  TON 2010»
13 years 22 days ago
Distributed Opportunistic Scheduling With Two-Level Probing
Distributed opportunistic scheduling (DOS) is studied for wireless ad-hoc networks in which many links contend for the channel using random access before data transmissions. Simpl...
P. S. Chandrashekhar Thejaswi, Junshan Zhang, Man-...
TWC
2010
13 years 22 days ago
MMSE Based Transceiver Designs in Closed-Loop Non-Regenerative MIMO Relaying Systems
In this paper, we propose a new design strategy based on the minimum mean-squared error (MMSE) in closedloop non-regenerative multiple-input multiple-output (MIMO) relaying system...
Chang-Ick Song, Kyoung-Jae Lee, Inkyu Lee
CCS
2011
ACM
12 years 6 months ago
Proofs of ownership in remote storage systems
Cloud storage systems are becoming increasingly popular. A promising technology that keeps their cost down is deduplication, which stores only a single copy of repeating data. Cli...
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra...