Sciweavers

3584 search results - page 634 / 717
» Design considerations for a network of information
Sort
View
HUC
2010
Springer
14 years 8 months ago
A holistic multipurpose life-log framework
Life-log systems have a wide range of usages from memory augmentation to health monitoring. Recent advances in pervasive devices and sensor networks enable us to create tools that...
Reza Rawassizadeh
CCS
2009
ACM
15 years 4 months ago
Multi-party off-the-record messaging
Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation i...
Ian Goldberg, Berkant Ustaoglu, Matthew Van Gundy,...
C5
2004
IEEE
15 years 1 months ago
Scratch: A Sneak Preview
information technologies as "the ability to reformulate knowledge, to express oneself creatively and appropriately, and to produce and generate information (rather than simply...
John Maloney, Leo Burd, Yasmin B. Kafai, Natalie R...
DIM
2008
ACM
14 years 11 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
WSDM
2012
ACM
290views Data Mining» more  WSDM 2012»
13 years 5 months ago
Online selection of diverse results
The phenomenal growth in the volume of easily accessible information via various web-based services has made it essential for service providers to provide users with personalized ...
Debmalya Panigrahi, Atish Das Sarma, Gagan Aggarwa...