A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Artificial Intelligence for Social Good: A Survey
[article]
2020
arXiv
pre-print
domains. (4) We discuss five issues that, we hope, can shed light on the future development of the AI4SG research. ...
ways. (1) We quantitatively analyze the distribution and trend of the AI4SG literature in terms of application domains and AI techniques used. (2) We propose three conceptual methods to systematically ...
., which consists of three modules Capture, Score, and Integrate, combines network features and textual features to detect fake news [234] . ...
arXiv:2001.01818v1
fatcat:t6sn75k56nb3fbqi4vi52i2j44
Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)
2006
IEEE Transactions on Dependable and Secure Computing
We first convert the involved Web pages into low resolution images and then use color and coordinate features to represent the image signatures. ...
We train an EMD threshold vector for classifying a Web page as a phishing or a normal one. ...
In order to address this problem, we will consider using textual features together with the visual features in our future work. ...
doi:10.1109/tdsc.2006.50
fatcat:isx2rn6i2jdvpkrbhojpczxzcm
Resilient Cyberphysical Systems and their Application Drivers: A Technology Roadmap
[article]
2019
arXiv
pre-print
In the paper, our focus is on design and deployment innovations that are broadly applicable across a range of CPS application areas. ...
and metropolises), urban structures (e.g., smart homes and cars), and living structures (e.g., human bodies, synthetic genomes). ...
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. ...
arXiv:2001.00090v1
fatcat:zaybw5wyfbayhcu34q2douctme
Measuring user engagement with low credibility media sources in a controversial online debate
2022
EPJ Data Science
By assigning the Twitter users an Untrustworthiness (U) score based on how frequently they engage with unreliable media outlets and cross-checking it with a qualitative political annotation of the communities ...
on immigration in Italy. ...
Filippo Menczer for his valuable advice and assistance in the correct interpretation of the Botometer results. ...
doi:10.1140/epjds/s13688-022-00342-w
pmid:35602319
pmcid:PMC9108351
fatcat:ax5giymjlngg7do3alhym3juoi
Critical visualization: a case for rethinking how we visualize risk and security
2015
Journal of Cybersecurity
these visualizations to focus too narrowly on adversarial security issues, ignoring important aspects of social and community-based security. ...
The authors take the position that the narratives on which cybersecurity visualizations are based ignore important aspects of cybersecurity and that their visual form causes the producers and users of ...
Foucault's distinction between making criminal judgement based on violations of the law and judgements based on perceived potential for crime is thus made vivid. ...
doi:10.1093/cybsec/tyv004
dblp:journals/cybersecurity/HallHC15
fatcat:yxtf2hcor5bgdgv3dd6qejzq2y
When the Watchers Become the Watched: A Qualitative Inquiry into Police Officer Perceptions of Body-Worn Cameras
[article]
2018
As it stands, the current research that examines the impact of body-worn cameras on citizen complaints and police use of force presents a narrow understanding of their use. ...
By drawing on Orlikowski and Gash's (1994) technological frames of reference framework, the study concludes that officers felt that both of the BWC models during the pilot project were inadequate, were ...
It's based on the way you perceive it to be. ...
doi:10.20381/ruor-21807
fatcat:x3zwnn25a5espd6ly7qf3ev55y
Moving Beyond the Crypto-Currency Success of Blockchain: A Systematic Survey
2021
Scalable Computing : Practice and Experience
In this paper we conduct a comprehensive survey on the blockchain technology, explaining its structure and functioning. ...
It has displayed enormous potential for revamping the customary industry with its key merits like decentralization, persistency, anonymity, and auditability. ...
We would like to thank TEQIP-III and MITS, Gwalior for supporting this research. ...
doi:10.12694/scpe.v22i3.1853
fatcat:d6kdy6eahvbwrnd3jw6szibno4
Based on these two core requirements of distribution and extensibility, we designed and implemented a stream processing language called SPL. ...
This paper describes the novel features that set SPL apart: -Language-level graph abstractions and restrictions on data and control dependencies that facilitate distribution. ...
The textual version of EventFlow is SQL-based and has first-order composite operators. ...
doi:10.1145/3039207
fatcat:t6fxwbbj6fgt5bjjsfeesdrym4
A domain united, a domain divided : an ethnographic study of social relations and social change among the people of Landu, East Rote, Eastern Indonesia
[article]
2016
This study, based on fieldwork conducted in the three villages of Sotimori, Bolatena and Daiama, offers an ethnographic study of Landu, in which I discuss the dynamics of social relations and social change ...
Landu is one of the eighteen domains (nusak) in the old political system on Rote Island, Eastern Indonesia. ...
provide some major features of the story based on the flow and setting of both versions below. ...
doi:10.25911/5d7784b87d8fb
fatcat:fchvdkk3cjhe3c2oqhzbl46qd4
Application-layer Fault-Tolerance Protocols
[article]
2016
arXiv
pre-print
Failing to address the application layer means leaving a backdoor open to problems such as design faults, interaction faults, or malicious attacks, whose consequences on the quality of service could be ...
Application-level fault-tolerance is a sub-class of software fault-tolerance that focuses on the problems of expressing the problems and solutions of fault-tolerance in the top layer of the hierarchy of ...
Let us denote with R the reliability of the basic component of the system, i.e., exp −λt , and R tmr as the reliability of the TMR system based on the same component. ...
arXiv:1611.02273v1
fatcat:my2uj2n2hrf4ljzpmbh4zlk57q
D6.1 System Orchestration And Management Design And Implementation
2018
Zenodo
It concludes all the efforts done at WP6, finalizing the control framework, the SLA-base deployment design, and completes the symbolic execution checking and anomaly detection tools implementation. ...
For example, when a tenant is suspected in malicious behaviour, one might test a few sequences of its data, even if belonging distant, possibly unrated time spans, or based on different features, and make ...
We have applied the detection algorithms to the problems of malicious tools detection via system calls monitoring and data leakage identification. ...
doi:10.5281/zenodo.1232116
fatcat:sdtzshzkljbennvyyi7qklryby
Collaborative media streaming
2009
ACM SIGMultimedia Records
Dependent on the desired course of the session the control operation is executed for all users, or the group is split into subgroups to let watchers follow their own time-lines. ...
on TV devices or computers in the home. ...
The view on a virtual reality environment is classified into local and global perspective: In the local view, a user may act on the environment without change of the global state, whereas changes to the ...
doi:10.1145/1662529.1662535
fatcat:omijwpz65fcvfboxvxwntpsija
Shivering greedy snakes, gradient-guided in wavelet domain
Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269)
And the watcher is tricked into enclosed space and then trapped. In order to get out alive, the watcher must find the sealed opening in the wall. You are the watcher. ...
An ado/aptive reading of Kelly's textual body maps an adopted body upon the wild colonial one. ...
doi:10.1109/icip.1998.723698
dblp:conf/icip/SakalliLY98
fatcat:ur6iqgldhjftjoqeznfdw6akhi
Intensional Cyberforensics
[article]
2014
arXiv
pre-print
As a base implementation language model, we use in this approach a new dialect of the Lucid programming language, called Forensic Lucid, and we focus on defining hierarchical contexts based on intensional ...
In large part, the language is based on its predecessor and codecessor Lucid dialects, such as GIPL, Indexical Lucid, Lucx, Objective Lucid, and JOOIP bound by the underlying intensional programming paradigm ...
, or missions, networks via sharing and firmware updates locally or globally and on the deep web when multiple agencies and aircraft manufactures collaborate for scalability [277, 308] . ...
arXiv:1312.0466v2
fatcat:q5ovtsdzt5hqbn7rxpiobhjgzi
The Postmodern Sacred
2010
Journal of Religion and Popular Culture
Because it is largely textually based, the postmodern sacred is consumptive, and is necessarily entangled with the mechanics of postmodern global capitalism. ...
a sequel on evangelical Christianity and how it informs the American spirit of global capitalism. ...
Yet by theorising that texts both explicitly and implicitly construct inequitable power relations, such cultural theory has traced the ways in which textual practice translates into real-world marginality ...
doi:10.3138/jrpc.22.1.007
fatcat:j6q5eng66fa23nduo7bb7uhvre
« Previous
Showing results 1 — 15 out of 99 results