Sciweavers

274 search results - page 48 / 55
» Social Network Data and Practices: The Case of Friendfeed
Sort
View
KDD
2008
ACM
138views Data Mining» more  KDD 2008»
14 years 8 months ago
A visual-analytic toolkit for dynamic interaction graphs
In this article we describe a visual-analytic tool for the interrogation of evolving interaction network data such as those found in social, bibliometric, WWW and biological appli...
Xintian Yang, Sitaram Asur, Srinivasan Parthasarat...
TON
2010
136views more  TON 2010»
13 years 2 months ago
Distributed Opportunistic Scheduling With Two-Level Probing
Distributed opportunistic scheduling (DOS) is studied for wireless ad-hoc networks in which many links contend for the channel using random access before data transmissions. Simpl...
P. S. Chandrashekhar Thejaswi, Junshan Zhang, Man-...
IEEESCC
2007
IEEE
14 years 1 months ago
Business-Activity Driven Search: Addressing the Information Needs of Services Professionals
Services business generates significant amount of human and machine created data. Search and discovery of relevant information from this data is a critical factor in enhancing wor...
Nithya Rajamani, Murthy V. Devarakonda, Yu Deng, W...
NSPW
2006
ACM
14 years 1 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
DRM
2006
Springer
13 years 11 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash