Sciweavers

337 search results - page 47 / 68
» Externalities in online advertising
Sort
View
SOUPS
2010
ACM
13 years 11 months ago
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety
An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of ...
Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit...
CIKM
2010
Springer
13 years 6 months ago
You are where you tweet: a content-based approach to geo-locating twitter users
We propose and evaluate a probabilistic framework for estimating a Twitter user’s city-level location based purely on the content of the user’s tweets, even in the absence of ...
Zhiyuan Cheng, James Caverlee, Kyumin Lee
RAID
2010
Springer
13 years 5 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
WWW
2004
ACM
14 years 8 months ago
BizCQ: using continual queries to cope with changes in business information exchange
In this poster, we propose the framework of BizCQ, a system to apply Continual Queries [7][8] on Web-based content to manage information exchanges between two business partners. I...
Wei Tang, R. Kipp Jones, Ling Liu, Calton Pu
IOLTS
2008
IEEE
117views Hardware» more  IOLTS 2008»
14 years 1 months ago
Verification and Analysis of Self-Checking Properties through ATPG
Present and future semiconductor technologies are characterized by increasing parameters variations as well as an increasing susceptibility to external disturbances. Transient err...
Marc Hunger, Sybille Hellebrand