Sciweavers

499 search results - page 90 / 100
» A Study on Latent Vulnerabilities
Sort
View
INFOCOM
2012
IEEE
13 years 2 months ago
Estimating age privacy leakage in online social networks
—It is well known that Online Social Networks (OSNs) are vulnerable to privacy leakages, whereby specific information about a user (political affiliation, sexual orientation, g...
Ratan Dey, Cong Tang, Keith W. Ross, Nitesh Saxena
101
Voted
ECOOP
2012
Springer
13 years 2 months ago
An Analysis of the Mozilla Jetpack Extension Framework
Abstract. The Jetpack framework is Mozilla’s newly-introduced extension development technology. Motivated primarily by the need to improve how scriptable extensions (also called ...
Rezwana Karim, Mohan Dhawan, Vinod Ganapathy, Chun...
IMC
2007
ACM
15 years 1 months ago
I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system
User Generated Content (UGC) is re-shaping the way people watch video and TV, with millions of video producers and consumers. In particular, UGC sites are creating new viewing pat...
Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-...
103
Voted
CVPR
2006
IEEE
16 years 2 months ago
Escaping local minima through hierarchical model selection: Automatic object discovery, segmentation, and tracking in video
Recently, the generative modeling approach to video segmentation has been gaining popularity in the computer vision community. For example, the flexible sprites framework has been...
Nebojsa Jojic, John M. Winn, Larry Zitnick
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
16 years 2 months ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang