Sciweavers

359 search results - page 67 / 72
» What to Do About Microsoft
Sort
View
ESWS
2010
Springer
15 years 2 months ago
Guarding a Walled Garden - Semantic Privacy Preferences for the Social Web
Abstract. With increasing usage of Social Networks, giving users the possibility to establish access restrictions on their data and resources becomes more and more important. Howev...
Philipp Kärger, Wolf Siberski
82
Voted
AGENTS
2001
Springer
15 years 1 months ago
The intelligent classroom: providing competent assistance
In the software industry, designers are forever trying to “improve” their products by adding ever more features to them, producing bloated software systems that are capable of...
David Franklin, Kristian J. Hammond
MPC
2010
Springer
174views Mathematics» more  MPC 2010»
15 years 1 months ago
Matrices as Arrows!
cting programs and point-free abstraction [2]. In order to automatically generate the fast running code there was the need to use matrix product as the basic matrix composition ope...
Hugo Daniel Macedo, José Nuno Oliveira
SOUPS
2010
ACM
15 years 1 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
INFOCOM
2000
IEEE
15 years 1 months ago
A Predictability Analysis of Network Traffic
This paper assesses the predictability of network traffic by considering two metrics: (1) how far into the future a traffic rate process can be predicted with bounded error; (2) w...
Aimin Sang, San-qi Li