Sciweavers

2492 search results - page 121 / 499
» False-Name-Proofness in Social Networks
Sort
View
ICWSM
2010
13 years 6 months ago
Faceplant: Impression (Mis)management in Facebook Status Updates
While recent research examined the impressions projected by users of Social Network Sites through their relatively static online profiles, the addition of status updates to Facebo...
Vladimir Barash, Nicolas Ducheneaut, Ellen Isaacs,...
ICDM
2010
IEEE
157views Data Mining» more  ICDM 2010»
13 years 6 months ago
Privacy Violations Using Microtargeted Ads: A Case Study
In this paper we propose a new class of attacks that exploit advertising systems offering microtargeting capabilities in order to breach user privacy. We study the advertising syst...
Aleksandra Korolova
ICASSP
2011
IEEE
12 years 11 months ago
Automatic identification of speaker role and agreement/disagreement in broadcast conversation
We present supervised approaches for detecting speaker roles and agreement/disagreement between speakers in broadcast conversation shows in three languages: English, Arabic, and M...
Wen Wang, Sibel Yaman, Kristin Precoda, Colleen Ri...
CSCW
2002
ACM
13 years 7 months ago
Articulating User Needs in Collaborative Design: Towards an Activity-Theoretical Approach
This paper analyses the collaborative design of a high-technology product, a neuromagnetometer used in the analysis of the activity of the human cortex. The producer, Neuromag Com...
Reijo Miettinen, Mervi Hasu
EDBT
2010
ACM
180views Database» more  EDBT 2010»
14 years 1 days ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...