Sciweavers

11573 search results - page 2099 / 2315
» Designing Relational Databases
Sort
View
MOBIHOC
2012
ACM
13 years 6 months ago
Dissemination in opportunistic social networks: the role of temporal communities
: Epidemic content dissemination in opportunistic social networks (OSN) has been analyzed in depth, theoretically and empirically. Most related works have studied the pairwise cont...
Anna Kaisa Pietiläinen, Christophe Diot
CRYPTO
2012
Springer
254views Cryptology» more  CRYPTO 2012»
13 years 6 months ago
Breaking and Repairing GCM Security Proofs
Abstract. In this paper, we study the security proofs of GCM (Galois/Counter Mode of Operation). We first point out that a lemma, which is related to the upper bound on the probab...
Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
13 years 6 months ago
eTrust: understanding trust evolution in an online world
Most existing research about online trust assumes static trust relations between users. As we are informed by social sciences, trust evolves as humans interact. Little work exists...
Jiliang Tang, Huan Liu, Huiji Gao, Atish Das Sarma...
SIGIR
2012
ACM
13 years 6 months ago
Inferring missing relevance judgments from crowd workers via probabilistic matrix factorization
In crowdsourced relevance judging, each crowd worker typically judges only a small number of examples, yielding a sparse and imbalanced set of judgments in which relatively few wo...
Hyun Joon Jung, Matthew Lease
PET
2012
Springer
13 years 6 months ago
PRISM - Privacy-Preserving Search in MapReduce
We present PRISM, a privacy-preserving scheme for word search in cloud computing. In the face of a curious cloud provider, the main challenge is to design a scheme that achieves pr...
Erik-Oliver Blass, Roberto Di Pietro, Refik Molva,...
« Prev « First page 2099 / 2315 Last » Next »