Sciweavers

248 search results - page 44 / 50
» A study of preferences for sharing and privacy
Sort
View
ACSAC
2010
IEEE
14 years 9 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
ICALP
2007
Springer
15 years 5 months ago
Private Multiparty Sampling and Approximation of Vector Combinations
We consider the problem of private efficient data mining of vertically-partitioned databases. Each of several parties holds a column of a data matrix (a vector) and the parties wan...
Yuval Ishai, Tal Malkin, Martin J. Strauss, Rebecc...
PERSUASIVE
2010
Springer
15 years 4 months ago
Happier Together: Integrating a Wellness Application into a Social Network Site
What are the benefits and drawbacks of integrating health and wellness interventions into existing online social network websites? In this paper, we report on a case study of deplo...
Sean A. Munson, Debra Lauterbach, Mark W. Newman, ...
ISCI
2008
86views more  ISCI 2008»
14 years 11 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...
108
Voted
CIKM
2010
Springer
14 years 10 months ago
Collaborative future event recommendation
We demonstrate a method for collaborative ranking of future events. Previous work on recommender systems typically relies on feedback on a particular item, such as a movie, and ge...
Einat Minkov, Ben Charrow, Jonathan Ledlie, Seth J...