Sciweavers

192 search results - page 4 / 39
» Who gets spammed
Sort
View
CEAS
2008
Springer
13 years 9 months ago
The Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
David Erickson, Martin Casado, Nick McKeown
ACSAC
2010
IEEE
13 years 4 months ago
Detecting spammers on social networks
Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms (such as Facebook, M...
Gianluca Stringhini, Christopher Kruegel, Giovanni...
ICDM
2009
IEEE
111views Data Mining» more  ICDM 2009»
14 years 2 months ago
A Game Theoretical Model for Adversarial Learning
Abstract—It is now widely accepted that in many situations where classifiers are deployed, adversaries deliberately manipulate data in order to reduce the classifier’s accura...
Wei Liu, Sanjay Chawla
CHI
1997
ACM
13 years 11 months ago
"I'll Get That Off the Audio": A Case Study of Salvaging Multimedia Meeting Records
We describe a case study of a complex, ongoing, collaborative work process, where the central activity is a series of meetings reviewing a wide range of subtle technical topics. T...
Thomas P. Moran, Leysia Palen, Steve R. Harrison, ...
ACE
2003
107views Education» more  ACE 2003»
13 years 8 months ago
Student satisfaction with groupwork in undergraduate computer science : do things get better?
Groupwork has a large and important role in computer science courses. Moreover, groupwork skills are among the most important generic attributes students should develop during the...
Helen Drury, Judy Kay, Warren Losberg