Sciweavers

2491 search results - page 280 / 499
» Social Networking
Sort
View
PERCOM
2011
ACM
14 years 8 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
147
Voted
ACMACE
2007
ACM
15 years 9 months ago
Building a table tennis game for three players
Physical leisure activities such as table tennis provide healthy exercise and can offer a means to connect with others socially; however, players have to be in the same physical l...
Florian Mueller, Martin R. Gibbs
TMRA
2007
Springer
15 years 11 months ago
Metadata Creation in Socio-semantic Tagging Systems: Towards Holistic Knowledge Creation and Interchange
Fuzzzy.com, a social bookmarking website has been developed to study collaborative creation of semantics. In a shared online space, users of Fuzzzy continuously create metadata bot...
Roy Lachica, Dino Karabeg
MM
2009
ACM
203views Multimedia» more  MM 2009»
15 years 9 months ago
Distance metric learning from uncertain side information with application to automated photo tagging
Automated photo tagging is essential to make massive unlabeled photos searchable by text search engines. Conventional image annotation approaches, though working reasonably well o...
Lei Wu, Steven C. H. Hoi, Rong Jin, Jianke Zhu, Ne...
CSCW
2010
ACM
16 years 1 months ago
Reading between the lines: linguistic cues to deception in online dating profiles
This study investigates whether deception in online dating profiles is detectable through a linguistic approach, which assumes that liars nonconsciously produce different word pat...
Catalina L. Toma, Jeffrey T. Hancock