Sciweavers

422 search results - page 65 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
PEPM
1999
ACM
15 years 4 months ago
Certifying Compilation and Run-Time Code Generation
A certifying compiler takes a source language program and produces object code, as well as a certi cate" that can be used to verify that the object code satis es desirable pr...
Luke Hornof, Trevor Jim
CAI
2011
Springer
14 years 6 months ago
Email Analysis and Information Extraction for Enterprise Benefit
In spite of rapid advances in multimedia and interactive technologies, enterprise users prefer to battle with email spam and overload rather than lose the benefits of communicatin...
Michal Laclavik, Stefan Dlugolinsky, Martin Seleng...
CSCW
2004
ACM
15 years 5 months ago
High-performance telepointers
Although telepointers are valuable for supporting real-time collaboration, they are rarely seen in commercial groupware applications that run on the Internet. One reason for their...
Jeff Dyck, Carl Gutwin, Sriram Subramanian, Chris ...
CSCW
1996
ACM
15 years 4 months ago
Supporting Multi-User, Multi-Applet Workspaces in CBE
Our experience with Internet-based scientific collaboratories indicates that they need to be user-extensible, allow users to add tools and objects dynamically to shared workspaces...
Jang Ho Lee, Atul Prakash, Trent Jaeger, Gwobaw Wu
SIGMOD
2011
ACM
179views Database» more  SIGMOD 2011»
14 years 2 months ago
No free lunch in data privacy
Differential privacy is a powerful tool for providing privacypreserving noisy query answers over statistical databases. It guarantees that the distribution of noisy query answers...
Daniel Kifer, Ashwin Machanavajjhala