Sciweavers

1311 search results - page 204 / 263
» Towards the ubiquitous Web
Sort
View
ACSAC
2004
IEEE
15 years 2 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
ACMDIS
2008
ACM
15 years 26 days ago
Sharing digital photographs in the home through physical mementos, souvenirs, and keepsakes
People now easily share digital photos outside the home via web publishing and gift-giving. Yet within the home, digital photos are hard to access and lack the physical affordance...
Michael Nunes, Saul Greenberg, Carman Neustaedter
84
Voted
WIS
2004
15 years 6 days ago
A Wireless Data Stream Mining Model
The sensor networks, web click stream and astronomical applications generate a continuous flow of data streams. Most likely data streams are generated in a wireless environment. Th...
Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady...
USS
2010
14 years 8 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
107
Voted
PVLDB
2011
14 years 5 months ago
Social Content Matching in MapReduce
Matching problems are ubiquitous. They occur in economic markets, labor markets, internet advertising, and elsewhere. In this paper we focus on an application of matching for soci...
Gianmarco De Francisci Morales, Aristides Gionis, ...