Sciweavers

1305 search results - page 240 / 261
» Inferring Privacy Information from Social Networks
Sort
View
IVS
2007
120views more  IVS 2007»
14 years 9 months ago
Visual exploration and analysis of historic hotel visits
Understanding the spatial and temporal characteristics of individual and group behavior in social networks is a critical component of visual tools for intelligence analysis, emerg...
Chris Weaver, David Fyfe, Anthony Robinson, Deryck...
CORR
2011
Springer
193views Education» more  CORR 2011»
14 years 1 months ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...
RECSYS
2009
ACM
15 years 4 months ago
Ordering innovators and laggards for product categorization and recommendation
Different buyers exhibit different purchasing behaviors. Some rush to purchase new products while others tend to be more cautious, waiting for reviews from people they trust. In...
Sarah K. Tyler, Shenghuo Zhu, Yun Chi, Yi Zhang
ACMDIS
2004
ACM
15 years 3 months ago
Sharing multimedia content with interactive public displays: a case study
The Plasma Posters are large screen, digital, interactive posterboards designed for informal content sharing within teams, groups, organizations and communities. Leveraging the fa...
Elizabeth F. Churchill, Les Nelson, Laurent Denoue...
CCS
2003
ACM
15 years 2 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves