Sciweavers

945 search results - page 13 / 189
» People are doing it for themselves
Sort
View
CCR
2005
97views more  CCR 2005»
14 years 9 months ago
On the robustness of router-based denial-of-service (DoS) defense systems
This paper focuses on "router-based" defense mechanisms, and whether they can provide effective solutions to network Denialof-Service (DoS) attacks. Router-based defense...
Ying Xu, Roch Guérin
CIKM
2011
Springer
13 years 9 months ago
Do all birds tweet the same?: characterizing twitter around the world
Social media services have spread throughout the world in just a few years. They have become not only a new source of information, but also new mechanisms for societies world-wide...
Barbara Poblete, Ruth Garcia, Marcelo Mendoza, Ale...
EKAW
2010
Springer
14 years 8 months ago
Social People-Tagging vs. Social Bookmark-Tagging
Abstract. Tagging has been widely used and studied in various domains. Recently, people-tagging has emerged as a means to categorize contacts, and is also used in some social acces...
Peyman Nasirifard, Sheila Kinsella, Krystian Samp,...
FIRSTMONDAY
2011
125views more  FIRSTMONDAY 2011»
14 years 4 months ago
The more people I meet, the more I like my dog: A study of pet-oriented social networks on the Web
There has been extensive research into friend-oriented and professional social networking websites, but relatively little work on passion-oriented sites designed to connect strang...
Jennifer Golbeck
ECOOP
2007
Springer
15 years 1 months ago
Why Don't People Use Refactoring Tools?
Tools that perform refactoring are currently under-utilized by programmers. As more advanced refactoring tools are designed, a great chasm widens between how the tools must be use...
Emerson R. Murphy-Hill, Andrew P. Black