Sciweavers

32 search results - page 3 / 7
» How to Get Your LISA Paper Accepted
Sort
View
WWW
2009
ACM
14 years 6 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...
IWPC
2007
IEEE
14 years 2 days ago
Understanding Execution Traces Using Massive Sequence and Circular Bundle Views
The use of dynamic information to aid in software understanding is a common practice nowadays. One of the many approaches concerns the comprehension of execution traces. A major i...
Bas Cornelissen, Danny Holten, Andy Zaidman, Leon ...
DRM
2007
Springer
13 years 12 months ago
Digital rights management: desirable, inevitable, and almost irrelevant
provides a very brief overview of some of the main points. References are given to my papers, where those points are explained in more detail, and citations are provided to the ext...
Andrew M. Odlyzko
FUIN
2010
93views more  FUIN 2010»
13 years 4 months ago
SAT as a Programming Environment for Linear Algebra
In this paper we present an application of the propositional SATisfiability environment to computing some simple orthogonal matrices and some interesting tasks in the area of cry...
Marian Srebrny, Lidia Stepien
GIS
2002
ACM
13 years 5 months ago
Design of field wrappers for mobile field data collection
In mobile field data collection, data gatherer requires to get geospatial information service to support in navigating to the right locations, describing context of observed objec...
Peisheng Zhao, Sarah Nusser, Leslie L. Miller