Sciweavers

6696 search results - page 1272 / 1340
» Securing social networks
Sort
View
UIST
2009
ACM
14 years 3 months ago
Activity analysis enabling real-time video communication on mobile phones for deaf users
We describe our system called MobileASL for real-time video communication on the current U.S. mobile phone network. The goal of MobileASL is to enable Deaf people to communicate w...
Neva Cherniavsky, Jaehong Chon, Jacob O. Wobbrock,...
ICDM
2008
IEEE
141views Data Mining» more  ICDM 2008»
14 years 3 months ago
Scalable Tensor Decompositions for Multi-aspect Data Mining
Modern applications such as Internet traffic, telecommunication records, and large-scale social networks generate massive amounts of data with multiple aspects and high dimensiona...
Tamara G. Kolda, Jimeng Sun
ICC
2007
IEEE
193views Communications» more  ICC 2007»
14 years 3 months ago
A Semantic Context Model for Location-Based Cooperative Mobile Computing
—This paper addresses context issues in pervasive mobile computing and presents a semantic context model to support location based cooperative mobile applications. In this paper,...
Bin Hu, Philip Moore, Hsiai-Hwa Chen
IPPS
2007
IEEE
14 years 3 months ago
Software and Algorithms for Graph Queries on Multithreaded Architectures
Search-based graph queries, such as finding short paths and isomorphic subgraphs, are dominated by memory latency. If input graphs can be partitioned appropriately, large cluster...
Jonathan W. Berry, Bruce Hendrickson, Simon Kahan,...
AIRWEB
2007
Springer
14 years 3 months ago
Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms. The presence of splogs degrades blog search results as well...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
« Prev « First page 1272 / 1340 Last » Next »