Sciweavers

1193 search results - page 190 / 239
» A primer of simple theories
Sort
View
WWW
2009
ACM
16 years 15 days ago
Collective privacy management in social networks
Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression f...
Anna Cinzia Squicciarini, Mohamed Shehab, Federica...
WWW
2009
ACM
16 years 15 days ago
How opinions are received by online communities: a case study on amazon.com helpfulness votes
There are many on-line settings in which users publicly express opinions. A number of these offer mechanisms for other users to evaluate these opinions; a canonical example is Ama...
Cristian Danescu-Niculescu-Mizil, Gueorgi Kossinet...
TCC
2009
Springer
141views Cryptology» more  TCC 2009»
16 years 11 days ago
Proofs of Retrievability via Hardness Amplification
Proofs of Retrievability (PoR), introduced by Juels and Kaliski [JK07], allow the client to store a file F on an untrusted server, and later run an efficient audit protocol in whi...
Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs
POPL
2006
ACM
16 years 4 days ago
Certified assembly programming with embedded code pointers
Embedded code pointers (ECPs) are stored handles of functions and continuations commonly seen in low-level binaries as well as functional or higher-order programs. ECPs are known ...
Zhaozhong Ni, Zhong Shao
SIGMOD
2008
ACM
89views Database» more  SIGMOD 2008»
15 years 12 months ago
Towards identity anonymization on graphs
The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply removing the identities ...
Kun Liu, Evimaria Terzi