Sciweavers

471 search results - page 22 / 95
» Social applications: exploring a more secure framework
Sort
View
IJDMMM
2008
72views more  IJDMMM 2008»
13 years 7 months ago
Mining event histories: a social science perspective
We explore how recent data-mining-based tools developed in domains such as biomedicine or text-mining for extracting interesting knowledge from sequence data could be applied to pe...
Gilbert Ritschard, Alexis Gabadinho, Nicolas S. M&...
AIS
2007
Springer
13 years 7 months ago
Unplanned effects of intelligent agents on Internet use: a social informatics approach
This paper instigates a discourse on the unplanned effects of intelligent agents in the context of their use on the Internet. By utilizing a social informatics framework as a lens...
Alexander Serenko, Umar Ruhi, Mihail Cocosila
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi
CCS
2005
ACM
14 years 1 months ago
Exploiting open functionality in SMS-capable cellular networks
Cellular networks are a critical component of the economic and social infrastructures in which we live. In addition to voice services, these networks deliver alphanumeric text mes...
William Enck, Patrick Traynor, Patrick McDaniel, T...
CHI
2007
ACM
13 years 11 months ago
A familiar face(book): profile elements as signals in an online social network
Using data from a popular online social network site, this paper explores the relationship between profile structure (namely, which fields are completed) and number of friends, gi...
Cliff Lampe, Nicole Ellison, Charles Steinfield