Sciweavers

6584 search results - page 958 / 1317
» Distributed Shared Contexts
Sort
View
ICML
2006
IEEE
16 years 5 months ago
Learning to impersonate
Consider Alice, who is interacting with Bob. Alice and Bob have some shared secret which helps Alice identify Bob-impersonators. Now consider Eve, who knows Alice and Bob, but doe...
Moni Naor, Guy N. Rothblum
118
Voted
WWW
2007
ACM
16 years 5 months ago
Discovering the best web service
Major research challenges in discovering Web services include, provisioning of services across multiple or heterogeneous registries, differentiating between services that share si...
Eyhab Al-Masri, Qusay H. Mahmoud
CHI
2009
ACM
16 years 5 months ago
Supporting carers in their caring role through design
Carers are people who look after family, partners or friends who could not manage without them because of frailness, illness or disability. Our contribution is to show the potenti...
Andrea Taylor, Richard Wilson, Stefan Agamanolis
PPOPP
2009
ACM
16 years 5 months ago
Detecting and tolerating asymmetric races
Because data races represent a hard-to-manage class of errors in concurrent programs, numerous approaches to detect them have been proposed and evaluated. We specifically consider...
Paruj Ratanaworabhan, Martin Burtscher, Darko Kiro...
KDD
2005
ACM
146views Data Mining» more  KDD 2005»
16 years 5 months ago
Anonymity-preserving data collection
Protection of privacy has become an important problem in data mining. In particular, individuals have become increasingly unwilling to share their data, frequently resulting in in...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright