Criminal identity matching is crucial to crime investigation in law enforcement agencies. Existing techniques match identities that refer to the same individuals based on simple i...
The advent of social networking websites presents further opportunities for criminals to obtain information for use in identity theft, cyber-stalking, and worse activities. This p...
William Newk-Fon Hey Tow, Peter Dell, John Venable
The problem today is that users are expected to remember multiple user names and passwords for different domains when accessing the Internet. Identity management solutions seek to...
In this paper we describe the results of a controlled study of a social game, Magpies, which was built on the Facebook Online Social Network (OSN) and enhanced with contextual soc...
Ben Kirman, Shaun Lawson, Conor Linehan, Francesco...
Recognition of complex activities from surveillance video requires detection and temporal ordering of its constituent "atomic" events. It also requires the capacity to ro...