Sciweavers

551 search results - page 110 / 111
» Social spam detection
Sort
View
SAC
2010
ACM
13 years 3 months ago
The 'Dresden Image Database' for benchmarking digital image forensics
This paper introduces and documents a novel image database specifically built for the purpose of development and benchmarking of camera-based digital forensic techniques. More th...
Thomas Gloe, Rainer Böhme
FIRSTMONDAY
2010
163views more  FIRSTMONDAY 2010»
13 years 2 months ago
Bubbles, gullibility, and other challenges for economics, psychology, sociology, and information sciences
Abstract. Gullibility is the principal cause of bubbles. Investors and the general public get snared by a "beautiful illusion" and throw caution to the wind. Attempts to ...
Andrew M. Odlyzko
JOC
2010
123views more  JOC 2010»
13 years 8 days ago
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
Abstract. In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computati...
Yonatan Aumann, Yehuda Lindell
CORR
2011
Springer
195views Education» more  CORR 2011»
12 years 9 months ago
Collective response of human populations to large-scale emergencies
Despite recent advances in uncovering the quantitative features of stationary human activity patterns, many applications, from pandemic prediction to emergency response, require a...
James P. Bagrow, Dashun Wang, Albert-Lászl&...
JOCN
2011
115views more  JOCN 2011»
12 years 8 months ago
Differential Involvement of Somatosensory and Interoceptive Cortices during the Observation of Affective Touch
■ Previous studies suggested that the observation of other individualsʼ somatosensory experiences also activates brain circuits processing oneʼs own somatosensory experiences....
Sjoerd J. H. Ebisch, Francesca Ferri, Anatolia Sal...