Sciweavers

422 search results - page 66 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
MOBISEC
2009
Springer
15 years 6 months ago
Filtering SPAM in P2PSIP Communities with Web of Trust
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasing...
Juho Heikkilä, Andrei Gurtov
WWW
2010
ACM
15 years 5 hour ago
A characterization of online browsing behavior
In this paper, we undertake a large-scale study of online user behavior based on search and toolbar logs. We propose a new CCS taxonomy of pageviews consisting of Content (news, p...
Ravi Kumar, Andrew Tomkins
KDD
2008
ACM
147views Data Mining» more  KDD 2008»
16 years 6 days ago
Mobile call graphs: beyond power-law and lognormal distributions
We analyze a massive social network, gathered from the records of a large mobile phone operator, with more than a million users and tens of millions of calls. We examine the distr...
Mukund Seshadri, Sridhar Machiraju, Ashwin Sridhar...
CHI
2009
ACM
15 years 6 months ago
Time sequences
Visualisations of dynamic data change in appearance over time, reflecting changes in the underlying data, be that the development of a social network, or the addition or removal o...
Ross Shannon, Aaron J. Quigley, Paddy Nixon
HT
2009
ACM
15 years 6 months ago
Contextualising tags in collaborative tagging systems
Collaborative tagging systems are now popular tools for organising and sharing information on the Web. While collaborative tagging offers many advantages over the use of controll...
Ching-man Au Yeung, Nicholas Gibbins, Nigel Shadbo...