Sciweavers

170 search results - page 23 / 34
» A Practical Attack to De-anonymize Social Network Users
Sort
View
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
BIS
2008
114views Business» more  BIS 2008»
13 years 9 months ago
Transforming Exchange-based Job Boards into Lasting Career Communities
Abstract. In this paper, we use a qualitative approach to explore which design aspects an erecruiting platform requires so as to achieve active long-term participation of its users...
Elfi Ettinger, Celeste Wilderom, Rolf Van Dick
ICNP
2007
IEEE
14 years 1 months ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...
WWW
2007
ACM
14 years 8 months ago
Expertise networks in online communities: structure and algorithms
Web-based communities have become important places for people to seek and share expertise. We find that networks in these communities typically differ in their topology from other...
Jun Zhang, Mark S. Ackerman, Lada A. Adamic
WWW
2011
ACM
13 years 2 months ago
Network bucket testing
Bucket testing, also known as A/B testing, is a practice that is widely used by on-line sites with large audiences: in a simple version of the methodology, one evaluates a new fea...
Lars Backstrom, Jon M. Kleinberg