Sciweavers

3299 search results - page 648 / 660
» Privacy and Trusted Computing
Sort
View
IJMMS
2007
166views more  IJMMS 2007»
13 years 8 months ago
Visualization of large networks with min-cut plots, A-plots and R-MAT
What does a ‘normal’ computer (or social) network look like? How can we spot ‘abnormal’ sub-networks in the Internet, or web graph? The answer to such questions is vital f...
Deepayan Chakrabarti, Christos Faloutsos, Yiping Z...
PERCOM
2010
ACM
13 years 7 months ago
Sensor.Network: An open data exchange for the web of things
Abstract—Tiny, wireless, sensors embedded in a large number of Internet-capable devices–smart phones, cameras, cars, toys, medical instruments, home appliances and energy meter...
Vipul Gupta, Arshan Poursohi, Poornaprajna Udupi
IDA
2011
Springer
13 years 3 months ago
Ubiquitous Knowledge Discovery
Ubiquitous Knowledge Discovery is a new research area at the intersection of machine learning and data mining with mobile and distributed systems. In this paper the main character...
João Gama, Michael May
CHI
2011
ACM
13 years 6 days ago
Identifying social capital in the facebook interface
A number of studies have identified a robust relationship between the use of social network sites, particularly Facebook, and positive outcomes such as social capital. Social netw...
Christian Yoder, Fred Stutzman
CHI
2011
ACM
13 years 6 days ago
Designing a phone broadcasting system for urban sex workers in India
In this paper, we present the design, implementation, and deployment of a phone-based broadcasting system designed for reaching out to at-risk populations in urban India. We worke...
Nithya Sambasivan, Julie Weber, Edward Cutrell