Sciweavers

1995 search results - page 281 / 399
» Belief in Information Flow
Sort
View
CSREAPSC
2006
13 years 11 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 10 months ago
Influence and Passivity in Social Media
The ever-increasing amount of information flowing through Social Media forces the members of these networks to compete for attention and influence by relying on other people to sp...
Daniel M. Romero, Wojciech Galuba, Sitaram Asur, B...
MM
2005
ACM
140views Multimedia» more  MM 2005»
14 years 3 months ago
Topic transition detection using hierarchical hidden Markov and semi-Markov models
In this paper we introduce a probabilistic framework to exploit hierarchy, structure sharing and duration information for topic transition detection in videos. Our probabilistic d...
Dinh Q. Phung, Thi V. Duong, Svetha Venkatesh, Hun...
ALGORITHMICA
2010
152views more  ALGORITHMICA 2010»
13 years 10 months ago
Gaming Prediction Markets: Equilibrium Strategies with a Market Maker
We study the equilibrium behavior of informed traders interacting with market scoring rule (MSR) market makers. One attractive feature of MSR is that it is myopically incentive com...
Yiling Chen, Stanko Dimitrov, Rahul Sami, Daniel M...
WWW
2007
ACM
14 years 11 months ago
Netprobe: a fast and scalable system for fraud detection in online auction networks
Given a large online network of online auction users and their histories of transactions, how can we spot anomalies and auction fraud? This paper describes the design and implemen...
Shashank Pandit, Duen Horng Chau, Samuel Wang, Chr...