Sciweavers

1852 search results - page 336 / 371
» Block-level link analysis
Sort
View
FC
2009
Springer
104views Cryptology» more  FC 2009»
14 years 2 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
IMC
2009
ACM
14 years 2 months ago
Understanding online social network usage from a network perspective
Online Social Networks (OSNs) have already attracted more than half a billion users. However, our understanding of which OSN features attract and keep the attention of these users...
Fabian Schneider, Anja Feldmann, Balachander Krish...
MM
2009
ACM
277views Multimedia» more  MM 2009»
14 years 2 months ago
Inferring semantic concepts from community-contributed images and noisy tags
In this paper, we exploit the problem of inferring images’ semantic concepts from community-contributed images and their associated noisy tags. To infer the concepts more accura...
Jinhui Tang, Shuicheng Yan, Richang Hong, Guo-Jun ...
FOCS
2008
IEEE
14 years 2 months ago
Kakeya Sets, New Mergers and Old Extractors
A merger is a probabilistic procedure which extracts the randomness out of any (arbitrarily correlated) set of random variables, as long as one of them is uniform. Our main result...
Zeev Dvir, Avi Wigderson
INFOCOM
2008
IEEE
14 years 2 months ago
An Explanation for Unexpected 802.11 Outdoor Link-level Measurement Results
—This paper provides experimental evidence that “weird”/poor outdoor link-level performance measurements may be caused by driver/card-specific antenna diversity algorithms u...
Domenico Giustiniano, Giuseppe Bianchi, Luca Scali...