Sciweavers

78 search results - page 9 / 16
» Survey on social tagging techniques
Sort
View
JCDL
2011
ACM
228views Education» more  JCDL 2011»
12 years 9 months ago
The ownership and reuse of visual media
This paper presents the results of a study of the ownership and reuse of visual media. A survey was administered to 250 social media-savvy respondents to investigate their attitud...
Catherine C. Marshall, Frank M. Shipman III
SIGIR
2009
ACM
14 years 1 months ago
Combining audio content and social context for semantic music discovery
When attempting to annotate music, it is important to consider both acoustic content and social context. This paper explores techniques for collecting and combining multiple sourc...
Douglas Turnbull, Luke Barrington, Gert R. G. Lanc...
WWW
2009
ACM
14 years 7 months ago
The slashdot zoo: mining a social network with negative edges
We analyse the corpus of user relationships of the Slashdot technology news site. The data was collected from the Slashdot Zoo feature where users of the website can tag other use...
Andreas Lommatzsch, Christian Bauckhage, Jé...
MDM
2009
Springer
269views Communications» more  MDM 2009»
14 years 1 months ago
R-U-In? - Exploiting Rich Presence and Converged Communications for Next-Generation Activity-Oriented Social Networking
—With the growing popularity of social networking, traditional Internet Service Providers (ISPs) and Telecom operators have both started exploring new opportunities to boost thei...
Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv D...
ESORICS
2009
Springer
14 years 1 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...