Sciweavers

433 search results - page 25 / 87
» Networks and our Limited Information Horizon
Sort
View
SOUPS
2009
ACM
15 years 4 months ago
flyByNight: mitigating the privacy risks of social networking
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...
Matthew M. Lucas, Nikita Borisov
IJCV
2012
13 years 4 days ago
Harmony Potentials - Fusing Global and Local Scale for Semantic Image Segmentation
The Hierarchical Conditional Random Field (HCRF) model have been successfully applied to a number of image labeling problems, including image segmentation. However, existing HCRF m...
Xavier Boix, Josep M. Gonfaus, Joost van de Weijer...
WWW
2009
ACM
15 years 10 months ago
Privacy diffusion on the web: a longitudinal perspective
For the last few years we have studied the diffusion of private information about users as they visit various Web sites triggering data gathering aggregation by third parties. Thi...
Balachander Krishnamurthy, Craig E. Wills
MIDDLEWARE
2005
Springer
15 years 3 months ago
Middleware for protocol-based coordination in dynamic networks
Pervasive and ad hoc computing applications are frequently deployed in dynamic networks. Due to mobility of the computing nodes, their unreliability, or a limited communication ra...
Kurt Schelfthout, Danny Weyns, Tom Holvoet
CORR
2010
Springer
64views Education» more  CORR 2010»
14 years 9 months ago
Selfish Response to Epidemic Propagation
An epidemic spreading in a network calls for a decision on the part of the network members: They should decide whether to protect themselves or not. Their decision depends on the ...
George Theodorakopoulos, Jean-Yves Le Boudec, John...