Sciweavers

170 search results - page 13 / 34
» A Practical Attack to De-anonymize Social Network Users
Sort
View
COMSNETS
2012
222views more  COMSNETS 2012»
12 years 3 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...
VL
2007
IEEE
122views Visual Languages» more  VL 2007»
14 years 1 months ago
Children as Unwitting End-User Programmers
Children who are active on the internet are performing significant design and programming activity without realising it, in the course of hacking little animations, game scripts a...
Marian Petre, Alan F. Blackwell
EICS
2009
ACM
14 years 2 months ago
Social network analysis and interactive device design analysis
What methods can we use to help understand why users adopt certain use strategies, and how can we evaluate designs to anticipate and perhaps positively modify how users are likely...
Harold W. Thimbleby, Patrick Oladimeji
CN
2007
111views more  CN 2007»
13 years 7 months ago
An auction mechanism for allocating the bandwidth of networks to their users
We present a mechanism for auctioning bandwidth on a network-wide basis to end users or ISPs that will utilize it for the same time period. This mechanism consists of a set of sim...
Manos Dramitinos, George D. Stamoulis, Costas Cour...
WPES
2005
ACM
14 years 1 months ago
Information revelation and privacy in online social networks
Participation in social networking sites has dramatically increased in recent years. Services such as Friendster, Tribe, or the Facebook allow millions of individuals to create on...
Ralph Gross, Alessandro Acquisti, H. John Heinz II...