Sciweavers

519 search results - page 67 / 104
» How to make secure email easier to use
Sort
View
65
Voted
ECIS
2004
14 years 11 months ago
Value-based business modelling for network organizations: lessons learned from the electricity sector
Speed and availability of information, delivered in past years by Internet technologies, made it easier for any company to outsource primary activities, which resulted in unbundli...
Vera Kartseva, Jaap Gordijn, Yao-Hua Tan
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
15 years 10 months ago
Practical learning from one-sided feedback
In many data mining applications, online labeling feedback is only available for examples which were predicted to belong to the positive class. Such applications include spam filt...
D. Sculley
SP
2007
IEEE
120views Security Privacy» more  SP 2007»
15 years 4 months ago
Endorsed E-Cash
An electronic cash (e-cash) scheme lets a user withdraw money from a bank and then spend it anonymously. E-cash can be used only if it can be securely and fairly exchanged for ele...
Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich
74
Voted
ASPLOS
2012
ACM
13 years 5 months ago
Data races vs. data race bugs: telling the difference with portend
Even though most data races are harmless, the harmful ones are at the heart of some of the worst concurrency bugs. Alas, spotting just the harmful data races in programs is like ï...
Baris Kasikci, Cristian Zamfir, George Candea
HPCN
1998
Springer
15 years 1 months ago
PARAFLOW: A Dataflow Distributed Data-Computing System
We describe the Paraflow system for connecting heterogeneous computing services together into a flexible and efficient data-mining metacomputer. There are three levels of parallel...
Roy Williams, Bruce Sears