Sciweavers

539 search results - page 60 / 108
» On Modelling User Observations in the UTP
Sort
View
JSAC
2007
224views more  JSAC 2007»
13 years 7 months ago
AMOEBA: Robust Location Privacy Scheme for VANET
Abstract— Communication messages in vehicular ad hoc networks (VANET) can be used to locate and track vehicles. While tracking can be beneficial for vehicle navigation, it can a...
Krishna Sampigethaya, Mingyan Li, Leping Huang, Ra...
CIKM
2010
Springer
13 years 6 months ago
Understanding retweeting behaviors in social networks
Retweeting is an important action (behavior) on Twitter, indicating the behavior that users re-post microblogs of their friends. While much work has been conducted for mining text...
Zi Yang, Jingyi Guo, Keke Cai, Jie Tang, Juanzi Li...
WSDM
2010
ACM
236views Data Mining» more  WSDM 2010»
14 years 5 months ago
Personalized Click Prediction in Sponsored Search
Sponsored search is a multi-billion dollar business that generates most of the revenue for search engines. Predicting the probability that users click on ads is crucial to sponsor...
Erick Cantú-Paz, Haibin Cheng
SIGMETRICS
2005
ACM
14 years 1 months ago
On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks
—To model P2P networks that are commonly faced with high rates of churn and random departure decisions by end-users, this paper investigates the resilience of random graphs to li...
Derek Leonard, Vivek Rai, Dmitri Loguinov
ECSCW
2003
13 years 9 months ago
Applying Cyber-Archaeology
Online spaces that enable public shared inter-personal communications are of significant social and economic importance. This paper outlines a theoretical model and methodology, la...
Quentin Jones