Sciweavers

499 search results - page 66 / 100
» A Study on Latent Vulnerabilities
Sort
View
AAAI
2012
13 years 2 months ago
Identifying Bullies with a Computer Game
Current computer involvement in adolescent social networks (youth between the ages of 11 and 17) provides new opportunities to study group dynamics, interactions amongst peers, an...
Juan Fernando Mancilla-Caceres, Wen Pu, Eyal Amir,...
106
Voted
JSS
2006
127views more  JSS 2006»
15 years 13 days ago
An approach to feature location in distributed systems
This paper describes an approach to the feature location problem for distributed systems, that is, to the problem of locating which code components are important in providing a pa...
Dennis Edwards, Sharon Simmons, Norman Wilde
CHI
2005
ACM
16 years 26 days ago
Traveling blues: the effect of relocation on partially distributed teams
This experimental study looks at how relocation affected the collaboration patterns of partially-distributed work groups. Partially distributed teams have part of their membership...
Nathan Bos, Judith S. Olson, Arik Cheshin, Yong-Su...
78
Voted
EDBT
2010
ACM
110views Database» more  EDBT 2010»
15 years 7 months ago
The hardness and approximation algorithms for l-diversity
The existing solutions to privacy preserving publication can be classified into the theoretical and heuristic categories. The former guarantees provably low information loss, whe...
Xiaokui Xiao, Ke Yi, Yufei Tao
77
Voted
SP
2009
IEEE
15 years 7 months ago
The Mastermind Attack on Genomic Data
In this paper, we study the degree to which a genomic string, Q, leaks details about itself any time it engages in comparison protocols with a genomic querier, Bob, even if those ...
Michael T. Goodrich