Sciweavers

170 search results - page 20 / 34
» A Practical Attack to De-anonymize Social Network Users
Sort
View
UM
2009
Springer
14 years 2 months ago
Google Shared. A Case-Study in Social Search
Web search is the dominant form of information access and everyday millions of searches are handled by mainstream search engines, but users still struggle to find what they are lo...
Barry Smyth, Peter Briggs, Maurice Coyle, Michael ...
CSE
2009
IEEE
13 years 11 months ago
Social Tagging in Query Expansion: A New Way for Personalized Web Search
Social networks and collaborative tagging systems are rapidly gaining popularity as primary means for sorting and sharing data: users tag their bookmarks in order to simplify infor...
Claudio Biancalana, Alessandro Micarelli
INFOCOM
2009
IEEE
14 years 2 months ago
Fair Routing in Delay Tolerant Networks
—The typical state-of-the-art routing algorithms for delay tolerant networks are based on best next hop hill-climbing heuristics in order to achieve throughput and efficiency. T...
Josep M. Pujol, Alberto Lopez Toledo, Pablo Rodrig...
PERCOM
2010
ACM
13 years 6 months ago
Privacy assurance in mobile sensing networks: Go beyond trusted servers
—Mobile devices are becoming the largest sensor network around the world. They could be used to collect a large amount of data with little effort and cost which is leading to a p...
Ling Hu, Cyrus Shahabi
PVLDB
2010
127views more  PVLDB 2010»
13 years 6 months ago
Identifying, Attributing and Describing Spatial Bursts
User generated content that appears on weblogs, wikis and social networks has been increasing at an unprecedented rate. The wealth of information produced by individuals from diff...
Michael Mathioudakis, Nilesh Bansal, Nick Koudas