Sciweavers

2454 search results - page 226 / 491
» Privacy in the Information and Communications Technologies
Sort
View
125
Voted
ICSE
2001
IEEE-ACM
15 years 6 months ago
Workshop on Software Engineering and Mobility
Mobility is redefining the hardware and software fabric of distributed systems. Wireless communication allows network hosts to participate in a distributed computation while on t...
Gruia-Catalin Roman, Gian Pietro Picco
87
Voted
DISCEX
2003
IEEE
15 years 7 months ago
Willow System Demonstration
Dealing with damage that arises during operation of networked information systems is essential if such systems are to provide the dependability required by modern critical applica...
John C. Knight, Jonathan Hill, Philip E. Varner, P...
93
Voted
WWW
2008
ACM
16 years 2 months ago
Web user de-identification in personalization
It is a kind of privacy infraction in personalized web service if the user profile submitted to one web site transferred to another site without user permission. That can cause th...
Jiaqian Zheng, Jing Yao, Junyu Niu
120
Voted
AIRWEB
2005
Springer
15 years 7 months ago
Blocking Blog Spam with Language Model Disagreement
We present an approach for detecting link spam common in blog comments by comparing the language models used in the blog post, the comment, and pages linked by the comments. In co...
Gilad Mishne, David Carmel, Ronny Lempel
105
Voted
JUCS
2006
113views more  JUCS 2006»
15 years 1 months ago
A Collaborative Biomedical Research System
: The convergence of need between improved clinical care and post genomics research presents a unique challenge to restructuring information flow so that it benefits both without c...
Adel Taweel, Alan L. Rector, Jeremy Rogers