Sciweavers

171 search results - page 8 / 35
» cse 2009
Sort
View
CSE
2009
IEEE
15 years 27 days ago
Adapting Privacy-Preserving Computation to the Service Provider Model
There are many applications for Secure Multi-Party Computation (SMC), but practical adoption is still an issue. One reason is that the business model of the application does not m...
Florian Kerschbaum
CSE
2009
IEEE
15 years 27 days ago
Social Networks' XSS Worms
— Online Social Networks are communities of people who share common interests. These types of networks are used by millions of people around the world. The massive adoption of th...
Mohammad Reza Faghani, Hossein Saidi
CSE
2009
IEEE
15 years 4 months ago
Privacy in Online Social Networking at Workplace
—Employees using social network sites (SNS) at workplace is a fact. As companies are further embracing social media, how if at all does this practice affect the work dynamics? Wh...
Yang Wang 0005, Alfred Kobsa
CSE
2009
IEEE
15 years 4 months ago
Probabilistic Generative Models of the Social Annotation Process
—With the growth in the past few years of social tagging services like Delicious and CiteULike, there is growing interest in modeling and mining these social systems for deriving...
Said Kashoob, James Caverlee, Elham Khabiri
CSE
2009
IEEE
15 years 4 months ago
Privacy-Preserving Multi-agent Constraint Satisfaction
—Constraint satisfaction has been a very successful paradigm for solving problems such as resource allocation and planning. Many of these problems pose themselves in a context in...
Thomas Léauté, Boi Faltings