Sciweavers

76665 search results - page 15255 / 15333
» A proposed
Sort
View
DIMVA
2011
14 years 3 months ago
Reverse Social Engineering Attacks in Online Social Networks
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the second most visited site on the Internet, and has b...
Danesh Irani, Marco Balduzzi, Davide Balzarotti, E...
ECIR
2011
Springer
14 years 3 months ago
Combining Global and Local Semantic Contexts for Improving Biomedical Information Retrieval
In the context of biomedical information retrieval (IR), this paper explores the relationship between the document’s global context and the query’s local context in an attempt ...
Duy Dinh, Lynda Tamine
EDBT
2011
ACM
209views Database» more  EDBT 2011»
14 years 3 months ago
An optimal strategy for monitoring top-k queries in streaming windows
Continuous top-k queries, which report a certain number (k) of top preferred objects from data streams, are important for a broad class of real-time applications, ranging from fi...
Di Yang, Avani Shastri, Elke A. Rundensteiner, Mat...
EDBT
2011
ACM
197views Database» more  EDBT 2011»
14 years 3 months ago
Symmetrizations for clustering directed graphs
Graph clustering has generally concerned itself with clustering undirected graphs; however the graphs from a number of important domains are essentially directed, e.g. networks of...
Venu Satuluri, Srinivasan Parthasarathy
EUROCRYPT
2011
Springer
14 years 3 months ago
Decentralizing Attribute-Based Encryption
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination othe...
Allison B. Lewko, Brent Waters
« Prev « First page 15255 / 15333 Last » Next »