Sciweavers

24105 search results - page 4595 / 4821
» Models in Information Retrieval
Sort
View
159
Voted
CONEXT
2009
ACM
15 years 1 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
119
Voted
GD
2008
Springer
15 years 1 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
MM
2010
ACM
219views Multimedia» more  MM 2010»
15 years 25 days ago
A framework for photo-quality assessment and enhancement based on visual aesthetics
We present an interactive application that enables users to improve the visual aesthetics of their digital photographs using spatial recomposition. Unlike earlier work that focuse...
Subhabrata Bhattacharya, Rahul Sukthankar, Mubarak...
118
Voted
SIGCOMM
2010
ACM
15 years 25 days ago
On the forwarding capability of mobile handhelds for video streaming over MANETs
Despite the importance of real-world experiments, nearly all ongoing research activities addressing video streaming over MANETs are based on simulation studies. Earlier research s...
Stein Kristiansen, Morten Lindeberg, Daniel Rodr&i...
115
Voted
SOUPS
2010
ACM
15 years 25 days ago
Improving users' security choices on home wireless networks
Home networks are common but notoriously difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is problematic because o...
Justin T. Ho, David Dearman, Khai N. Truong
« Prev « First page 4595 / 4821 Last » Next »