Sciweavers

1350 search results - page 191 / 270
» Reasoning about Staged Computation
Sort
View
CCS
2009
ACM
15 years 10 months ago
Confidentiality-preserving distributed proofs of conjunctive queries
Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing sp...
Adam J. Lee, Kazuhiro Minami, Nikita Borisov
COORDINATION
2009
Springer
15 years 10 months ago
Mobility Models and Behavioural Equivalence for Wireless Networks
In protocol development for wireless systems, the choice of appropriate mobility models describing the movement patterns of devices has long been recognised as a crucial factor for...
Jens Chr. Godskesen, Sebastian Nanz
KDD
2006
ACM
172views Data Mining» more  KDD 2006»
15 years 10 months ago
Attack detection in time series for recommender systems
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
CHI
2008
ACM
15 years 10 months ago
Your place or mine?: visualization as a community component
Many Eyes is a web site that provides collaborative visualization services, allowing users to upload data sets, visualize them, and comment on each other's visualizations. Th...
Catalina M. Danis, Fernanda B. Viégas, Jess...
CHI
2007
ACM
15 years 10 months ago
Project massive: self-regulation and problematic use of online gaming
A longitudinal design was employed to collect three waves of survey data over a 14 month period from 2790 online gamers. Respondents were asked questions about their gaming activi...
A. Fleming Seay, Robert E. Kraut