Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
In this work we examine nine different sources for user similarity as reflected by activity in social media applications. We suggest a classification of these sources into three c...
Ido Guy, Michal Jacovi, Adam Perer, Inbal Ronen, E...
The combined advances of open mobile platforms and online social networking applications (SNAs) are driving pervasive computing to the real-world users, as the mobile SNAs are exp...
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
The paper describes a further development of the design of a motivational visualization encouraging participation in an online community. The new design overcomes shortcomings in p...