Sciweavers

64 search results - page 11 / 13
» A comparative study of online privacy policies and formats
Sort
View
CSE
2009
IEEE
14 years 2 months ago
Information Flow and Search in Unstructured Keyword Based Social Networks
—In online social networks (OSNs), user connections can be represented as a network. The network formed has distinct properties that distinguish it from other network topologies....
Ankush Garg, Prantik Bhattacharyya, Charles U. Mar...
CCS
2007
ACM
14 years 1 months ago
An inquiry into the nature and causes of the wealth of internet miscreants
This paper studies an active underground economy which specializes in the commoditization of activities such as credit card fraud, identity theft, spamming, phishing, online crede...
Jason Franklin, Adrian Perrig, Vern Paxson, Stefan...
UIST
2003
ACM
14 years 22 days ago
Rhythm modeling, visualizations and applications
People use their awareness of others' temporal patterns to plan work activities and communication. This paper presents algorithms for programatically detecting and modeling t...
James Begole, John C. Tang, Rosco Hill
CCS
2011
ACM
12 years 7 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
CJ
2004
141views more  CJ 2004»
13 years 7 months ago
Modeling and Analysis of a Scheduled Maintenance System: a DSPN Approach
This paper describes a way to manage the modeling and analysis of Scheduled Maintenance Systems (SMS) within an analytically tractable context. We chose a significant case study h...
Andrea Bondavalli, Roberto Filippini