In this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blackl...
Chris Grier, Kurt Thomas, Vern Paxson, Michael Zha...
A problem with many of today's appliance interfaces is that they are inconsistent. For example, the procedure for setting the time on alarm clocks and VCRs differs, even amon...
In sensor networks, data acquisition frequently takes place at lowcapability devices. The acquired data is then transmitted through a hierarchy of nodes having progressively incre...
Utkarsh Srivastava, Kamesh Munagala, Jennifer Wido...
This study explores the readiness factors for the adoption of Internet-based inter-organizational systems (IOS) via a case analysis of fifteen Taiwanese firms. By proposing a thre...
Many web documents refer to specific geographic localities and many people include geographic context in queries to web search engines. Standard web search engines treat the geogra...
Subodh Vaid, Christopher B. Jones, Hideo Joho, Mar...