Sciweavers

1222 search results - page 225 / 245
» corr 2008
Sort
View
73
Voted
CORR
2011
Springer
165views Education» more  CORR 2011»
14 years 1 months ago
Finding Deceptive Opinion Spam by Any Stretch of the Imagination
Consumers increasingly go online to rate, review and research products (Jansen, 2010; Litvin et al., 2008). Consequently, websites containing these reviews are becoming targets of...
Myle Ott, Yejin Choi, Claire Cardie, Jeffrey T. Ha...
CORR
2008
Springer
152views Education» more  CORR 2008»
14 years 10 months ago
Characterizing User Mobility in Second Life
In this work we present a measurement study of user mobility in Second Life. We first discuss different techniques to collect user traces and then focus on results obtained using ...
Chi-Anh La, Pietro Michiardi
90
Voted
CORR
2008
Springer
147views Education» more  CORR 2008»
14 years 10 months ago
Impact of CSI on Distributed Space-Time Coding in Wireless Relay Networks
We consider a two-hop wireless network where a transmitter communicates with a receiver via M relays with an amplify-and-forward (AF) protocol. Recent works have shown that sophis...
Mari Kobayashi, Xavier Mestre
CORR
2008
Springer
158views Education» more  CORR 2008»
14 years 10 months ago
Declarative Combinatorics: Isomorphisms, Hylomorphisms and Hereditarily Finite Data Types in Haskell
This paper is an exploration in a functional programming framework of isomorphisms between elementary data types (natural numbers, sets, finite functions, permutations binary deci...
Paul Tarau
CORR
2011
Springer
174views Education» more  CORR 2011»
14 years 5 months ago
Distributed Private Data Analysis: On Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs – secure function evaluation (SFE) and differential...
Amos Beimel, Kobbi Nissim, Eran Omri