Sciweavers

394 search results - page 66 / 79
» Monetizing User Activity on Social Networks - Challenges and...
Sort
View
CORR
2011
Springer
193views Education» more  CORR 2011»
12 years 11 months ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...
KDD
2008
ACM
186views Data Mining» more  KDD 2008»
14 years 8 months ago
Scalable and near real-time burst detection from eCommerce queries
In large scale online systems like Search, eCommerce, or social network applications, user queries represent an important dimension of activities that can be used to study the imp...
Nish Parikh, Neel Sundaresan
DFN
2003
13 years 9 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
CSCW
2006
ACM
14 years 1 months ago
Response times in N-user replicated, centralized, and proximity-based hybrid collaboration architectures
We evaluate response times, in N-user collaborations, of the popular centralized (client-server) and replicated (peer-to-peer) architectures, and a hybrid architecture in which ea...
Sasa Junuzovic, Prasun Dewan
GLOBECOM
2007
IEEE
14 years 1 months ago
Priority Collision Resolution - Distributed Coordination Function for Distributed Wireless Networks
— In distributed wireless access networks, the short-term unfairness of IEEE 802.11 Distributed Coordination Function (DCF) has been revealed by many works. In this paper, a modi...
Xiaohui Ye, Xin Liu, S. J. Ben Yoo, Zhi Ding