Sciweavers

358 search results - page 70 / 72
» Preserving Privacy in Awareness Systems
Sort
View
78
Voted
CCS
2009
ACM
15 years 10 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
HICSS
2003
IEEE
186views Biometrics» more  HICSS 2003»
15 years 2 months ago
Personalization through Mask Marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are expl...
Moritz Strasser, Alf Zugenmaier
MIDDLEWARE
2009
Springer
15 years 4 months ago
Heterogeneous Gossip
Abstract. Gossip-based information dissemination protocols are considered easy to deploy, scalable and resilient to network dynamics. Loadbalancing is inherent in these protocols a...
Davide Frey, Rachid Guerraoui, Anne-Marie Kermarre...
NETWORK
2008
233views more  NETWORK 2008»
14 years 9 months ago
WhozThat? evolving an ecosystem for context-aware mobile social networks
One of the most compelling social questions, which until now was left unanswered by current technology, is "Who's that?" This question is usually asked about a new ...
Aaron Beach, Mike Gartrell, Sirisha Akkala, Jack E...
OOPSLA
2007
Springer
15 years 3 months ago
Living in the comfort zone
A comfort zone is a tested region of a system’s input space within which it has been observed to behave acceptably. To keep systems operating within their comfort zones, we advo...
Martin C. Rinard