We investigate the process of collaborative modeling by analyzing conversations and loud thinking during modeling sessions and the resulting models themselves. We discovered the ba...
People often seek information by asking other people even when they have access to vast reservoirs of information such as the Internet and libraries. This is because people are gr...
We consider a near future scenario in which users of a Web 2.0 application, such as a social network, contribute to the application not only data, but also rules which automatical...
Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...
Abstract. We study the use of viral marketing strategies on social networks that seek to maximize revenue from the sale of a single product. We propose a model in which the decisio...
David Arthur, Rajeev Motwani, Aneesh Sharma, Ying ...