In this study, we analyzed the language use on Twitter personal exchanges as well as properties of the users’ networks, to study the influence of gender composition on expressio...
Funda Kivran-Swaine, Samuel Brody, Nicholas Diakop...
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...
Object tracking typically relies on a dynamic model to
predict the object’s location from its past trajectory. In
crowded scenarios a strong dynamic model is particularly
impo...
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...