Sciweavers

311 search results - page 53 / 63
» Social network activity and social well-being
Sort
View
DFN
2003
13 years 10 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
CHI
2005
ACM
14 years 9 months ago
Visualization in law enforcement
Visualization techniques have proven to be critical in helping crime analysis. By interviewing and observing Criminal Intelligence Officers (CIO) and civilian crime analysts at th...
Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron...
CIKM
2005
Springer
14 years 2 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
WWW
2006
ACM
14 years 9 months ago
Invisible participants: how cultural capital relates to lurking behavior
The asymmetry of activity in virtual communities is of great interest. While participation in the activities of virtual communities is crucial for a community's survival and ...
Vladimir Soroka, Sheizaf Rafaeli
CHI
2009
ACM
14 years 3 months ago
Time sequences
Visualisations of dynamic data change in appearance over time, reflecting changes in the underlying data, be that the development of a social network, or the addition or removal o...
Ross Shannon, Aaron J. Quigley, Paddy Nixon