Sciweavers

422 search results - page 55 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
NDSS
2000
IEEE
15 years 3 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
IACR
2011
123views more  IACR 2011»
13 years 11 months ago
Hummingbird: Privacy at the time of Twitter
In the last several years, micro-blogging Online Social Networks (OSNs), such as Twitter, have taken the world by storm, now boasting over 100 million subscribers. As an unparalle...
Emiliano De Cristofaro, Claudio Soriente, Gene Tsu...
LAWEB
2007
IEEE
15 years 6 months ago
Geographical Characterization of YouTube: a Latin American View
Online social media applications have exploded in popularity in the Web. In most of these applications, users interact with other users and create content that becomes available o...
Fernando Duarte, Fabrício Benevenuto, Virgi...
CONEXT
2008
ACM
15 years 1 months ago
Is there life in Second Life?
Abstract: Social virtual worlds such as Second Life are digital representations of the real world where human-controlled avatars evolve and interact through social activities. Unde...
Matteo Varvello, Fabio Picconi, Christophe Diot, E...
ICDM
2007
IEEE
124views Data Mining» more  ICDM 2007»
15 years 6 months ago
Local Probabilistic Models for Link Prediction
One of the core tasks in social network analysis is to predict the formation of links (i.e. various types of relationships) over time. Previous research has generally represented ...
Chao Wang, Venu Satuluri, Srinivasan Parthasarathy