Sciweavers

1592 search results - page 64 / 319
» The state of the email address
Sort
View
SOCINFO
2010
13 years 7 months ago
Dynamic Context-Sensitive PageRank for Expertise Mining
Abstract. Online tools for collaboration and social platforms have become omnipresent in Web-based environments. Interests and skills of people evolve over time depending in perfor...
Daniel Schall, Schahram Dustdar
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
13 years 7 months ago
Detecting Novel Discrepancies in Communication Networks
Abstract--We address the problem of detecting characteristic patterns in communication networks. We introduce a scalable approach based on set-system discrepancy. By implicitly lab...
James Abello, Tina Eliassi-Rad, Nishchal Devanur
USS
2010
13 years 7 months ago
Searching the Searchers with SearchAudit
Search engines not only assist normal users, but also provide information that hackers and other malicious entities can exploit in their nefarious activities. With carefully craft...
John P. John, Fang Yu, Yinglian Xie, Martín...
ITIIS
2010
200views more  ITIIS 2010»
13 years 4 months ago
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups
Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key...
Kwangsu Lee, Dong Hoon Lee
CORR
2011
Springer
193views Education» more  CORR 2011»
13 years 29 days ago
How Unique and Traceable are Usernames?
Abstract. Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses ...
Daniele Perito, Claude Castelluccia, Mohamed Ali K...