With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
The spread of influence among individuals in a social network can be naturally modeled in a probabilistic framework, but it is challenging to reason about differences between vari...
Dan Cosley, Daniel P. Huttenlocher, Jon M. Kleinbe...
We present a new approach to information fusion of web data sources. It is based on peer-to-peer mappings between sources and utilizes correspondences between their instances. Suc...
Erhard Rahm, Andreas Thor, David Aumueller, Hong H...
Social networking has provided powerful new ways to find people, organize groups, and share information. Recently, the potential functionalities of the ubiquitous infrastructure le...
Mobile phones are becoming increasingly personalized in terms of the data they store and the types of services they provide. At the same time, field studies have reported that the...
Amy K. Karlson, A. J. Bernheim Brush, Stuart E. Sc...