Sciweavers

25195 search results - page 4962 / 5039
» Applications of Computers to Dance
Sort
View
ICFP
2010
ACM
14 years 11 months ago
Distance makes the types grow stronger: a calculus for differential privacy
We want assurances that sensitive information will not be disclosed when aggregate data derived from a database is published. Differential privacy offers a strong statistical guar...
Jason Reed, Benjamin C. Pierce
ISLPED
2010
ACM
170views Hardware» more  ISLPED 2010»
14 years 10 months ago
Low-power sub-threshold design of secure physical unclonable functions
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...
MOBICOM
2010
ACM
14 years 10 months ago
SMS-based web search for low-end mobile devices
Short Messaging Service (SMS) based mobile information services have become increasingly common around the world, especially in emerging regions among users with low-end mobile de...
Jay Chen, Lakshminarayanan Subramanian, Eric A. Br...
MOBICOM
2010
ACM
14 years 10 months ago
NVS: a virtualization substrate for WiMAX networks
This paper describes the design and implementation of a network virtualization substrate (NVS) for effective virtualization of wireless resources in WiMAX networks. Virtualization...
Ravi Kokku, Rajesh Mahindra, Honghai Zhang, Sampat...
CCS
2010
ACM
14 years 10 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...
« Prev « First page 4962 / 5039 Last » Next »