Sciweavers

3374 search results - page 82 / 675
» Explaining Similarity of Terms
Sort
View
WSDM
2010
ACM
1328views Data Mining» more  WSDM 2010»
15 years 7 months ago
TwitterRank: Finding Topic-sensitive Influential Twitterers
This paper focuses on the problem of identifying influential users of micro-blogging services. Twitter, one of the most notable micro-blogging services, employs a social-networkin...
Jianshu Weng, Ee-peng Lim, Jing Jiang, Qi He
ATAL
2009
Springer
15 years 4 months ago
Effective tag mechanisms for evolving cooperation
Certain observable features (tags), shared by a group of similar agents, can be used to signal intentions and can be effectively used to infer unobservable properties. Such infere...
Matthew Matlock, Sandip Sen
CLEAR
2007
Springer
296views Biometrics» more  CLEAR 2007»
15 years 4 months ago
PittPatt Face Detection and Tracking for the CLEAR 2007 Evaluation
Abstract. This paper describes Pittsburgh Pattern Recognition’s participation in the face detection and tracking tasks for the CLEAR 2007 evaluation. Since CLEAR 2006, we have ma...
Michael C. Nechyba, Louis Brandy, Henry Schneiderm...
62
Voted
CCS
2003
ACM
15 years 3 months ago
DoS protection for UDP-based protocols
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments. In this paper we argue how this attack need not ...
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld
PODS
2010
ACM
306views Database» more  PODS 2010»
15 years 3 months ago
Optimizing linear counting queries under differential privacy
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. But despite much recent work, optimal strategies for answe...
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Mikla...