Sciweavers

100 search results - page 19 / 20
» Mining specifications of malicious behavior
Sort
View
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
14 years 1 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communitiesâ€...
Karine Barzilai-Nahon
CSCW
2004
ACM
14 years 29 days ago
Using social psychology to motivate contributions to online communities
Under-contribution is a problem for many online communities. Social psychology theories of social loafing and goal-setting can provide mid-level design principles to address this ...
Gerard Beenen, Kimberly S. Ling, Xiaoqing Wang, Kl...
LAWEB
2003
IEEE
14 years 24 days ago
Finding Buying Guides with a Web Carnivore
Research on buying behavior indicates that buying guides perform an important role in the overall buying process. However, while many buying guides can be found on the Web, findin...
Reiner Kraft, Raymie Stata
TDP
2010
140views more  TDP 2010»
13 years 2 months ago
Movement Data Anonymity through Generalization
In recent years, spatio-temporal and moving objects databases have gained considerable interest, due to the diffusion of mobile devices (e.g., mobile phones, RFID devices and GPS ...
Anna Monreale, Gennady L. Andrienko, Natalia V. An...
CADE
2005
Springer
14 years 7 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin