The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper studies the problem of selecting users in an online social network for targeted advertising so as to maximize the adoption of a given product. In previous work, two families of models have been considered to address this problem: direct targeting and network-based targeting. The former approach targets users with the highest propensity to adopt the product, while the latter approach targets...
Identity safekeeping on chats has recently become an important problem on social networks. One of the most important issues is identity theft, where impostors steal the identity of a person, substituting her in the chats, in order to have access to private information. In the literature, the problem has been addressed by designing sets of features which capture the way a person interacts through the...
SPam over Instant Messaging (SPIM), is becoming one of the major challenges for the IM Networks. These messages affect the overall performance in various ways, ranging from waste of resources e.g. Memory, unwanted traffic on the Network, to major disasters e.g. spread of worms, DoS attacks etc. Different techniques have been proposed for the detection of SPIM; based on content-based searches, feature...
In this paper, an intelligent intrusion detection system, based on UPnP technology for smart home is proposed. In the developed system, home users equipped with PDAs may locally and remotely receive the alert of home intrusion with captured subject image. There are two key components developed in this system. One is the intrusion image processing (IIP) to recognize the intrusion and extract the intrusion...
Instant Messaging (IM) is a peer-to-peer service for remote users to communicate with each others. There are many IM systems such as MSN Messenger and Yahoo Messenger which are used by millions of users everyday. However, IM technology serves as a double edged sword and could be misused for illegitimate information exchange or committing crimes for its anonymity and completely uncontrolled chatting...
Internet-based Chat environments such as Internet relay Chat and instant messaging pose a challenge for data mining and information retrieval systems due to the multi-threaded, overlapping nature of the dialog and the nonstandard usage of language. In this paper we present preliminary methods of topic detection and topic thread extraction that augment a typical TF-IDF-based vector space model approach...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.