Sciweavers

556 search results - page 110 / 112
» Link Privacy in Social Networks
Sort
View
WWW
2011
ACM
13 years 2 months ago
Towards semantic knowledge propagation from text corpus to web images
In this paper, we study the problem of transfer learning from text to images in the context of network data in which link based bridges are available to transfer the knowledge bet...
Guojun Qi, Charu C. Aggarwal, Thomas Huang
WSDM
2012
ACM
334views Data Mining» more  WSDM 2012»
12 years 3 months ago
mTrust: discerning multi-faceted trust in a connected world
Traditionally, research about trust assumes a single type of trust between users. However, trust, as a social concept, inherently has many facets indicating multiple and heterogen...
Jiliang Tang, Huiji Gao, Huan Liu
OZCHI
2009
ACM
14 years 2 months ago
Towards an ethical interaction design: the issue of including stakeholders in law-enforcement software development
In the public sector (particularly in the UK in light of recent reforms i.e. the Local Government Act 2000, etc.) a greater degree of accountability and public involvement or inte...
Patrick G. Watson, Penny Duquenoy, Margaret Brenna...
ICDCS
2007
IEEE
13 years 11 months ago
Understanding Instant Messaging Traffic Characteristics
Instant messaging (IM) has become increasingly popular due to its quick response time, its ease of use, and possibility of multitasking. It is estimated that there are several mil...
Zhen Xiao, Lei Guo, John M. Tracey
AC
2008
Springer
13 years 7 months ago
Computing with RFID- Drivers, Technology and Implications
Radio Frequency Identification or simply rfid has come to be an integral part of modern computing. Rfid is notable in that it is the first practical technology to tightly couple p...
George Roussos