Sciweavers

1763 search results - page 304 / 353
» Scientific Data Collections and Distributed Collective Pract...
Sort
View
142
Voted
IEEECIT
2010
IEEE
15 years 2 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
239
Voted
GAMESEC
2011
287views Game Theory» more  GAMESEC 2011»
14 years 3 months ago
Collaborative Location Privacy with Rational Users
Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with the...
Francisco Santos, Mathias Humbert, Reza Shokri, Je...
148
Voted
SIGIR
2012
ACM
13 years 6 months ago
TFMAP: optimizing MAP for top-n context-aware recommendation
In this paper, we tackle the problem of top-N context-aware recommendation for implicit feedback scenarios. We frame this challenge as a ranking problem in collaborative filterin...
Yue Shi, Alexandros Karatzoglou, Linas Baltrunas, ...
141
Voted
INFOCOM
2000
IEEE
15 years 8 months ago
RMX: Reliable Multicast for Heterogeneous Networks
—Although IP Multicast is an effective network primitive for best-effort, large-scale, multi-point communication, many multicast applications such as shared whiteboards, multi-pl...
Yatin Chawathe, Steven McCanne, Eric A. Brewer
119
Voted
IFIP8
2007
15 years 5 months ago
Grid-VirtuE: A Layered Architecture for Grid Virtual Enterprises
A grid virtual enterprise is a community of independent enterprises concerned with a particular sector of the economy. Its members (nodes) are small or medium size enterprises (SME...
Alfredo Cuzzocrea, Alessandro D'Atri, Andrea Gualt...