Sciweavers

5693 search results - page 148 / 1139
» Socially relevant computing
Sort
View
CHI
2005
ACM
16 years 4 months ago
Assessing differential usage of usenet social accounting meta-data
We describe a usage study of Netscan\Tech, a system that generates and publishes daily a range of social metrics across three dimensions: newsgroup, author, and thread, for a set ...
A. J. Bernheim Brush, Xiaoqing Wang, Tammara Combs...
ICPR
2010
IEEE
15 years 9 months ago
Social Network Approach to Analysis of Soccer Game
Video understanding has been an active area of research, where many articles have been published on how to detect and track objects in videos, and how to analyze their trajectorie...
Kyoung-Jin Park, Alper Yilmaz
CSCW
2004
ACM
15 years 9 months ago
Emergent networks, locus of control, and the pursuit of social capital
In this paper we examine the relationship between emergent social network characteristics in a computer-supported collaborative learning course and locus of control. An emergent c...
Michael Stefanone, Jeffrey T. Hancock, Geri Gay, A...
CEAS
2006
Springer
15 years 8 months ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...
CCS
2010
ACM
15 years 3 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim