Sciweavers

499 search results - page 90 / 100
» A Study on Latent Vulnerabilities
Sort
View
101
Voted
INFOCOM
2012
IEEE
12 years 12 months ago
Estimating age privacy leakage in online social networks
—It is well known that Online Social Networks (OSNs) are vulnerable to privacy leakages, whereby specific information about a user (political affiliation, sexual orientation, g...
Ratan Dey, Cong Tang, Keith W. Ross, Nitesh Saxena
ECOOP
2012
Springer
12 years 12 months ago
An Analysis of the Mozilla Jetpack Extension Framework
Abstract. The Jetpack framework is Mozilla’s newly-introduced extension development technology. Motivated primarily by the need to improve how scriptable extensions (also called ...
Rezwana Karim, Mohan Dhawan, Vinod Ganapathy, Chun...
110
Voted
IMC
2007
ACM
14 years 11 months ago
I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system
User Generated Content (UGC) is re-shaping the way people watch video and TV, with millions of video producers and consumers. In particular, UGC sites are creating new viewing pat...
Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-...
CVPR
2006
IEEE
15 years 11 months ago
Escaping local minima through hierarchical model selection: Automatic object discovery, segmentation, and tracking in video
Recently, the generative modeling approach to video segmentation has been gaining popularity in the computer vision community. For example, the flexible sprites framework has been...
Nebojsa Jojic, John M. Winn, Larry Zitnick
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
15 years 11 months ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang