Sciweavers

1305 search results - page 228 / 261
» Inferring Privacy Information from Social Networks
Sort
View
PERCOM
2008
ACM
15 years 1 months ago
Randomized Bit Encoding for Stronger Backward Channel Protection in RFID Systems
In this paper, we introduce a randomized bit encoding scheme that can strengthen the privacy protection on RFID tags. This scheme is used together with the backward channel protec...
Tong-Lee Lim, Tieyan Li, Sze-Ling Yeo
113
Voted
OOPSLA
2010
Springer
15 years 8 days ago
G-Finder: routing programming questions closer to the experts
Programming forums are becoming the primary tools for programmers to find answers for their programming problems. Our empirical study of popular programming forums shows that the...
Wei Li, Charles Zhang, Songlin Hu
HASE
2002
IEEE
15 years 6 months ago
The Concept and Practice of Software Quality Assurance in Japan in the Global Era
The Japanese computer industry in 1990s was hit with two major shocks at the same time. One shock was the drastic reform of computers and of network. The other shock was from the ...
Katsuyuki Yasuda, Shigeru Yamada
103
Voted
MM
2003
ACM
118views Multimedia» more  MM 2003»
15 years 7 months ago
PROMISE: peer-to-peer media streaming using CollectCast
We present the design, implementation, and evaluation of PROMISE, a novel peer-to-peer media streaming system encompassing the key functions of peer lookup, peer-based aggregated ...
Mohamed Hefeeda, Ahsan Habib, Boyan Botev, Dongyan...
106
Voted
SIGCOMM
2009
ACM
15 years 8 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...