Sciweavers

198 search results - page 35 / 40
» Multidimensional screening: online computation and limited i...
Sort
View
SOUPS
2005
ACM
15 years 3 months ago
Stopping spyware at the gate: a user study of privacy, notice and spyware
Spyware is a significant problem for most computer users. The term “spyware” loosely describes a new class of computer software. This type of software may track user activitie...
Nathaniel Good, Rachna Dhamija, Jens Grossklags, D...
FCCM
1999
IEEE
134views VLSI» more  FCCM 1999»
15 years 2 months ago
Runlength Compression Techniques for FPGA Configurations
The time it takes to reconfigure FPGAs can be a significant overhead for reconfigurable computing. In this paper we develop new compression algorithms for FPGA configurations that...
Scott Hauck, William D. Wilson
COLING
2010
14 years 5 months ago
Contextual Recommendation based on Text Mining
The potential benefit of integrating contextual information for recommendation has received much research attention recently, especially with the ever-increasing interest in mobil...
Yize Li, Jiazhong Nie, Yi Zhang, Bingqing Wang, Ba...
MM
2005
ACM
250views Multimedia» more  MM 2005»
15 years 3 months ago
An object-based video coding framework for video sequences obtained from static cameras
This paper presents a novel object-based video coding framework for videos obtained from a static camera. As opposed to most existing methods, the proposed method does not require...
Asaad Hakeem, Khurram Shafique, Mubarak Shah
SOUPS
2009
ACM
15 years 4 months ago
flyByNight: mitigating the privacy risks of social networking
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...
Matthew M. Lucas, Nikita Borisov