Sciweavers

394 search results - page 70 / 79
» Monetizing User Activity on Social Networks - Challenges and...
Sort
View
ICC
2008
IEEE
164views Communications» more  ICC 2008»
14 years 2 months ago
Detection of Encrypted Tunnels Across Network Boundaries
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
SIGOPS
2010
126views more  SIGOPS 2010»
13 years 6 months ago
Scaling a monitoring infrastructure for the Akamai network
We describe the design of, and experience with, Query, a monitoring system that supports the Akamai EdgePlatform. Query is a foundation of Akamai’s approach to administering its...
Thomas Repantis, Jeff Cohen, Scott Smith, Joel Wei...
WWW
2010
ACM
14 years 2 months ago
Atomate it! end-user context-sensitive automation using heterogeneous information sources on the web
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...
CHI
2006
ACM
14 years 8 months ago
Emoticons convey emotions without cognition of faces: an fMRI study
In this paper, we describe the brain activities that are associated with emoticons by using functional MRI (fMRI). In communication over a computer network, we use faces such as c...
Masahide Yuasa, Keiichi Saito, Naoki Mukawa
CIKM
2010
Springer
13 years 6 months ago
Visual cube and on-line analytical processing of images
On-Line Analytical Processing (OLAP) has shown great success in many industry applications, including sales, marketing, management, financial data analysis, etc. In this paper, w...
Xin Jin, Jiawei Han, Liangliang Cao, Jiebo Luo, Bo...