Sciweavers

34181 search results - page 6563 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
ICFP
2010
ACM
15 years 5 months ago
Distance makes the types grow stronger: a calculus for differential privacy
We want assurances that sensitive information will not be disclosed when aggregate data derived from a database is published. Differential privacy offers a strong statistical guar...
Jason Reed, Benjamin C. Pierce
MM
2010
ACM
265views Multimedia» more  MM 2010»
15 years 4 months ago
Affective image classification using features inspired by psychology and art theory
Images can affect people on an emotional level. Since the emotions that arise in the viewer of an image are highly subjective, they are rarely indexed. However there are situation...
Jana Machajdik, Allan Hanbury
MOBICOM
2010
ACM
15 years 4 months ago
Design and experimental evaluation of multi-user beamforming in wireless LANs
Multi-User MIMO promises to increase the spectral efficiency of next generation wireless systems and is currently being incorporated in future industry standards. Although a signi...
Ehsan Aryafar, Narendra Anand, Theodoros Salonidis...
CCS
2010
ACM
15 years 4 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
SIGCOMM
2010
ACM
15 years 4 months ago
Circumventing censorship with collage
Oppressive regimes and even democratic governments restrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are...
Sam Burnett, Nick Feamster, Santosh Vempala
« Prev « First page 6563 / 6837 Last » Next »