Sciweavers

5793 search results - page 889 / 1159
» Individual communication complexity
Sort
View
CHI
2004
ACM
16 years 5 months ago
Effects of instant messaging on the management of multiple project trajectories
We present a study of the effects of instant messaging (IM) on individuals' management of work across multiple collaborative projects. Groups of four participants completed f...
Susan R. Fussell, Sara B. Kiesler, Leslie D. Setlo...
STOC
2005
ACM
112views Algorithms» more  STOC 2005»
16 years 5 months ago
Covert two-party computation
We introduce the novel concept of covert two-party computation. Whereas ordinary secure two-party computation only guarantees that no more knowledge is leaked about the inputs of t...
Luis von Ahn, Nicholas J. Hopper, John Langford
ICDE
2010
IEEE
288views Database» more  ICDE 2010»
16 years 5 months ago
Global Iceberg Detection over Distributed Data Streams
In today's Internet applications or sensor networks we often encounter large amounts of data spread over many physically distributed nodes. The sheer volume of the data and ba...
Ashwin Lall, Haiquan (Chuck) Zhao, Jun Xu, Mitsuno...
MOBISYS
2007
ACM
16 years 5 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
16 years 2 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke