Sciweavers

2492 search results - page 474 / 499
» False-Name-Proofness in Social Networks
Sort
View
FI
2010
175views more  FI 2010»
13 years 7 months ago
Applications and Security of Next-Generation, User-Centric Wireless Systems
: Pervasive wireless systems have significantly improved end-users' quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual inform...
Jerry Rick Ramstetter, Yaling Yang, Danfeng Yao
IJBIS
2010
94views more  IJBIS 2010»
13 years 7 months ago
A framework towards a multi-modal fingerprinting scheme for multimedia assets
Fingerprinting is a well known approach for identifying multimedia data without having the original data present but what amounts to its essence or "DNA". Current approa...
Atta Badii, Daniel Thiemert
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
14 years 10 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
MOBISYS
2009
ACM
14 years 10 months ago
A framework of energy efficient mobile sensing for automatic user state recognition
Urban sensing, participatory sensing, and user activity recognition can provide rich contextual information for mobile applications such as social networking and location-based se...
Yi Wang, Jialiu Lin, Murali Annavaram, Quinn Jacob...
KDD
2005
ACM
140views Data Mining» more  KDD 2005»
14 years 10 months ago
Graphs over time: densification laws, shrinking diameters and possible explanations
How do real graphs evolve over time? What are "normal" growth patterns in social, technological, and information networks? Many studies have discovered patterns in stati...
Jure Leskovec, Jon M. Kleinberg, Christos Faloutso...