Sciweavers

15 search results - page 3 / 3
» Collusion-resistant anonymous data collection method
Sort
View
PAM
2011
Springer
12 years 8 months ago
Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors
1 The arms race between copyright agencies and P2P users is an ongoing and evolving struggle. On the one hand, content providers are using several techniques to stealthily find un...
Rahul Potharaju, Jeff Seibert, Sonia Fahmy, Cristi...
MM
2005
ACM
145views Multimedia» more  MM 2005»
13 years 10 months ago
Multiple instance learning for labeling faces in broadcasting news video
Labeling faces in news video with their names is an interesting research problem which was previously solved using supervised methods that demand significant user efforts on lab...
Jun Yang 0003, Rong Yan, Alexander G. Hauptmann
MMMACNS
2005
Springer
13 years 10 months ago
A Passive External Web Surveillance Technique for Private Networks
The variety and richness of what users browse on the Internet has made the communications of web-browsing hosts an attractive target for surveillance. We show that passive external...
Constantine Daicos, Scott Knight
KDD
2009
ACM
174views Data Mining» more  KDD 2009»
14 years 5 months ago
Audience selection for on-line brand advertising: privacy-friendly social network targeting
This paper describes and evaluates privacy-friendly methods for extracting quasi-social networks from browser behavior on user-generated content sites, for the purpose of finding ...
Foster J. Provost, Brian Dalessandro, Rod Hook, Xi...
COMCOM
2002
124views more  COMCOM 2002»
13 years 5 months ago
Thin-client Web access patterns: Measurements from a cache-busting proxy
This paper describes a new technique for measuring Web client request patterns and analyzes a large client trace collected using the new method. In this approach a modified proxy ...
Terence Kelly