Sciweavers

2309 search results - page 312 / 462
» Patterns for Technology Companies
Sort
View
WWW
2009
ACM
16 years 5 months ago
A method of analyzing credibility based on LOD control of digital maps
Digital maps are widely used and appear on all types of platforms for integrating content. Users can change display region and scale by panning, zooming in, and zooming out on a d...
Daisuke Kitayama, Ryong Lee, Kazutoshi Sumiya
WWW
2009
ACM
16 years 5 months ago
Modeling semantics and structure of discussion threads
The abundant knowledge in web communities has motivated the research interests in discussion threads. The dynamic nature of discussion threads poses interesting and challenging pr...
Chen Lin, Jiang-Ming Yang, Rui Cai, Xin-Jing Wang,...
WWW
2009
ACM
16 years 5 months ago
Inferring private information using social network data
On-line social networks, such as Facebook, are increasingly utilized by many users. These networks allow people to publish details about themselves and connect to their friends. S...
Jack Lindamood, Raymond Heatherly, Murat Kantarcio...
WWW
2009
ACM
16 years 5 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
WWW
2009
ACM
16 years 5 months ago
Behavioral profiles for advanced email features
We examine the behavioral patterns of email usage in a large-scale enterprise over a three-month period. In particular, we focus on two main questions: (Q1) what do replies depend...
Thomas Karagiannis, Milan Vojnovic