Sciweavers

2454 search results - page 205 / 491
» Privacy in the Information and Communications Technologies
Sort
View
CHI
2007
ACM
16 years 2 months ago
Give and take: a study of consumer photo-sharing culture and practice
In this paper, we present initial findings from the study of a digital photo-sharing website: Flickr.com. In particular, we argue that Flickr.com appears to support--for some peop...
Andrew D. Miller, W. Keith Edwards
122
Voted
CCS
2010
ACM
15 years 8 months ago
A game theoretic model for digital identity and trust in online communities
Digital identity and trust management mechanisms play an important role on the Internet. They help users make decisions on trustworthiness of digital identities in online communit...
Tansu Alpcan, Cengiz Örencik, Albert Levi, Er...
CCS
2009
ACM
15 years 8 months ago
Reactive noninterference
Many programs operate reactively, patiently waiting for user input, subsequently running for a while producing output, and eventually returning to a state where they are ready to ...
Aaron Bohannon, Benjamin C. Pierce, Vilhelm Sj&oum...
CCS
2009
ACM
15 years 8 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...
HOST
2008
IEEE
15 years 8 months ago
Circuit CAD Tools as a Security Threat
Abstract: Circuit CAD Tools as a Security Threat Jarrod A. Roy†, Farinaz Koushanfar‡ and Igor L. Markov† †The University of Michigan, Department of EECS, 2260 Hayward Ave.,...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov