Sciweavers

1402 search results - page 255 / 281
» Personalized privacy preservation
Sort
View
109
Voted
ATAL
2008
Springer
15 years 2 months ago
Mobile opportunistic commerce: mechanisms, architecture, and application
We present mechanisms, architectures, and an implementation addressing challenges with mobile opportunistic commerce centering on markets and mechanisms that support the procureme...
Ece Kamar, Eric Horvitz, Chris Meek
JUCS
2006
225views more  JUCS 2006»
15 years 11 days ago
Restricting the View and Connecting the Dots - Dangers of a Web Search Engine Monopoly
: Everyone realizes how powerful the few big Web search engine companies have become, both in terms of financial resources due to soaring stock quotes and in terms of the still hid...
Narayanan Kulathuramaiyer, Wolf-Tilo Balke
ICDE
2007
IEEE
162views Database» more  ICDE 2007»
16 years 1 months ago
On Density Based Transforms for Uncertain Data Mining
In spite of the great progress in the data mining field in recent years, the problem of missing and uncertain data has remained a great challenge for data mining algorithms. Many ...
Charu C. Aggarwal
MOBISYS
2009
ACM
16 years 29 days ago
Wifi-reports: improving wireless network selection with collaboration
Wi-Fi clients can obtain much better performance at some commercial hotspots than at others. Unfortunately, there is currently no way for users to determine which hotspot access p...
Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Da...
99
Voted
STOC
2005
ACM
132views Algorithms» more  STOC 2005»
16 years 22 days ago
Concurrent general composition of secure protocols in the timing model
In the setting of secure multiparty computation, a set of parties wish to to jointly compute some function of their input (i.e., they wish to securely carry out some distributed t...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...