Sciweavers

248 search results - page 44 / 50
» A study of preferences for sharing and privacy
Sort
View
ACSAC
2010
IEEE
14 years 7 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
ICALP
2007
Springer
15 years 3 months ago
Private Multiparty Sampling and Approximation of Vector Combinations
We consider the problem of private efficient data mining of vertically-partitioned databases. Each of several parties holds a column of a data matrix (a vector) and the parties wan...
Yuval Ishai, Tal Malkin, Martin J. Strauss, Rebecc...
PERSUASIVE
2010
Springer
15 years 2 months ago
Happier Together: Integrating a Wellness Application into a Social Network Site
What are the benefits and drawbacks of integrating health and wellness interventions into existing online social network websites? In this paper, we report on a case study of deplo...
Sean A. Munson, Debra Lauterbach, Mark W. Newman, ...
ISCI
2008
86views more  ISCI 2008»
14 years 9 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...
CIKM
2010
Springer
14 years 8 months ago
Collaborative future event recommendation
We demonstrate a method for collaborative ranking of future events. Previous work on recommender systems typically relies on feedback on a particular item, such as a movie, and ge...
Einat Minkov, Ben Charrow, Jonathan Ledlie, Seth J...