Sciweavers

3007 search results - page 174 / 602
» Designing for collective remembering
Sort
View
TOG
2012
193views Communications» more  TOG 2012»
13 years 8 months ago
Schelling points on 3D surface meshes
This paper investigates “Schelling points” on 3D meshes, feature points selected by people in a pure coordination game due to their salience. To collect data for this investig...
Xiaobai Chen, Abulhair Saparov, Bill Pang, Thomas ...
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
13 years 8 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
13 years 8 months ago
Mining event periodicity from incomplete observations
Advanced technology in GPS and sensors enables us to track physical events, such as human movements and facility usage. Periodicity analysis from the recorded data is an important...
Zhenhui Li, Jingjing Wang, Jiawei Han
ESORICS
2012
Springer
13 years 7 months ago
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Ge...
AAAI
2012
13 years 7 months ago
Identifying Bullies with a Computer Game
Current computer involvement in adolescent social networks (youth between the ages of 11 and 17) provides new opportunities to study group dynamics, interactions amongst peers, an...
Juan Fernando Mancilla-Caceres, Wen Pu, Eyal Amir,...