Sciweavers

1712 search results - page 61 / 343
» Discovering user profiles
Sort
View
CORR
2010
Springer
82views Education» more  CORR 2010»
15 years 4 months ago
Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using ...
Stevens Le-Blond, Arnaud Legout, Fabrice Le Fessan...
NSPW
2004
ACM
15 years 10 months ago
The user non-acceptance paradigm: INFOSEC's dirty little secret
(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...
ICC
2008
IEEE
176views Communications» more  ICC 2008»
15 years 11 months ago
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
Jiankun Hu, Don Gingrich, Andy Sentosa
SEMWEB
2009
Springer
15 years 9 months ago
Supporting Multi-view User Ontology to Understand Company Value Chains
The objective of the Market Blended Insight (MBI) project is to develop web based techniques to improve the performance of UK Business to Business (B2B) marketing activities. The a...
Landong Zuo, Manuel Salvadores, S. M. Hazzaz Imtia...
150
Voted
WWW
2006
ACM
16 years 5 months ago
Discovering event evolution graphs from newswires
In this paper, we propose an approach to automatically mine event evolution graphs from newswires on the Web. Event evolution graph is a directed graph in which the vertices and e...
Christopher C. Yang, Xiaodong Shi