Sciweavers

8056 search results - page 1539 / 1612
» Object Behavior Analysis
Sort
View
TON
2010
159views more  TON 2010»
14 years 9 months ago
Googling the internet: profiling internet endpoints via the world wide web
Understanding Internet access trends at a global scale, i.e., how people use the Internet, is a challenging problem that is typically addressed by analyzing network traces. However...
Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuz...
CORR
2011
Springer
196views Education» more  CORR 2011»
14 years 6 months ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum
ACSAC
2010
IEEE
14 years 6 months ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon
154
Voted
CGF
2011
14 years 6 months ago
Visual Exploration of Time-Series Data with Shape Space Projections
Time-series data is a common target for visual analytics, as they appear in a wide range of application domains. Typical tasks in analyzing time-series data include identifying cy...
Matthew O. Ward, Zhenyu Guo
CHI
2011
ACM
14 years 6 months ago
Improving the safety of homeless young people with mobile phones: values, form and function
By their pervasiveness and by being worn on our bodies, mobile phones seem to have become intrinsic to safety. To examine this proposition, 43 participants, from four stakeholder ...
Jill Palzkill Woelfer, Amy Iverson, David G. Hendr...
« Prev « First page 1539 / 1612 Last » Next »