Filters








99 Hits in 8.3 sec

Artificial Intelligence for Social Good: A Survey [article]

Zheyuan Ryan Shi, Claire Wang, Fei Fang
2020 arXiv   pre-print
domains. (4) We discuss five issues that, we hope, can shed light on the future development of the AI4SG research.  ...  ways. (1) We quantitatively analyze the distribution and trend of the AI4SG literature in terms of application domains and AI techniques used. (2) We propose three conceptual methods to systematically  ...  ., which consists of three modules Capture, Score, and Integrate, combines network features and textual features to detect fake news [234] .  ... 
arXiv:2001.01818v1 fatcat:t6sn75k56nb3fbqi4vi52i2j44

Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover's Distance (EMD)

Anthony Y. Fu, Liu Wenyin, Xiaotie Deng
2006 IEEE Transactions on Dependable and Secure Computing  
We first convert the involved Web pages into low resolution images and then use color and coordinate features to represent the image signatures.  ...  We train an EMD threshold vector for classifying a Web page as a phishing or a normal one.  ...  In order to address this problem, we will consider using textual features together with the visual features in our future work.  ... 
doi:10.1109/tdsc.2006.50 fatcat:isx2rn6i2jdvpkrbhojpczxzcm

Resilient Cyberphysical Systems and their Application Drivers: A Technology Roadmap [article]

Somali Chaterji, Parinaz Naghizadeh, Muhammad Ashraful Alam, Saurabh Bagchi, Mung Chiang, David Corman, Brian Henz, Suman Jana, Na Li, Shaoshuai Mou, Meeko Oishi, Chunyi Peng (+5 others)
2019 arXiv   pre-print
In the paper, our focus is on design and deployment innovations that are broadly applicable across a range of CPS application areas.  ...  and metropolises), urban structures (e.g., smart homes and cars), and living structures (e.g., human bodies, synthetic genomes).  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
arXiv:2001.00090v1 fatcat:zaybw5wyfbayhcu34q2douctme

Measuring user engagement with low credibility media sources in a controversial online debate

Salvatore Vilella, Alfonso Semeraro, Daniela Paolotti, Giancarlo Ruffo
2022 EPJ Data Science  
By assigning the Twitter users an Untrustworthiness (U) score based on how frequently they engage with unreliable media outlets and cross-checking it with a qualitative political annotation of the communities  ...  on immigration in Italy.  ...  Filippo Menczer for his valuable advice and assistance in the correct interpretation of the Botometer results.  ... 
doi:10.1140/epjds/s13688-022-00342-w pmid:35602319 pmcid:PMC9108351 fatcat:ax5giymjlngg7do3alhym3juoi

Critical visualization: a case for rethinking how we visualize risk and security

Peter Hall, Claude Heath, Lizzie Coles-Kemp
2015 Journal of Cybersecurity  
these visualizations to focus too narrowly on adversarial security issues, ignoring important aspects of social and community-based security.  ...  The authors take the position that the narratives on which cybersecurity visualizations are based ignore important aspects of cybersecurity and that their visual form causes the producers and users of  ...  Foucault's distinction between making criminal judgement based on violations of the law and judgements based on perceived potential for crime is thus made vivid.  ... 
doi:10.1093/cybsec/tyv004 dblp:journals/cybersecurity/HallHC15 fatcat:yxtf2hcor5bgdgv3dd6qejzq2y

When the Watchers Become the Watched: A Qualitative Inquiry into Police Officer Perceptions of Body-Worn Cameras [article]

Nevena Aksin, University, My, University, My
2018
As it stands, the current research that examines the impact of body-worn cameras on citizen complaints and police use of force presents a narrow understanding of their use.  ...  By drawing on Orlikowski and Gash's (1994) technological frames of reference framework, the study concludes that officers felt that both of the BWC models during the pilot project were inadequate, were  ...  It's based on the way you perceive it to be.  ... 
doi:10.20381/ruor-21807 fatcat:x3zwnn25a5espd6ly7qf3ev55y

Moving Beyond the Crypto-Currency Success of Blockchain: A Systematic Survey

Mir Shahnawaz Ahmad, Shahid Mehraj Shah
2021 Scalable Computing : Practice and Experience  
In this paper we conduct a comprehensive survey on the blockchain technology, explaining its structure and functioning.  ...  It has displayed enormous potential for revamping the customary industry with its key merits like decentralization, persistency, anonymity, and auditability.  ...  We would like to thank TEQIP-III and MITS, Gwalior for supporting this research.  ... 
doi:10.12694/scpe.v22i3.1853 fatcat:d6kdy6eahvbwrnd3jw6szibno4

SPL

Martin Hirzel, Scott Schneider, Buğra Gedik
2017 ACM Transactions on Programming Languages and Systems  
Based on these two core requirements of distribution and extensibility, we designed and implemented a stream processing language called SPL.  ...  This paper describes the novel features that set SPL apart: -Language-level graph abstractions and restrictions on data and control dependencies that facilitate distribution.  ...  The textual version of EventFlow is SQL-based and has first-order composite operators.  ... 
doi:10.1145/3039207 fatcat:t6fxwbbj6fgt5bjjsfeesdrym4

A domain united, a domain divided : an ethnographic study of social relations and social change among the people of Landu, East Rote, Eastern Indonesia [article]

Lintje H. Pellu, University, The Australian National, University, The Australian National
2016
This study, based on fieldwork conducted in the three villages of Sotimori, Bolatena and Daiama, offers an ethnographic study of Landu, in which I discuss the dynamics of social relations and social change  ...  Landu is one of the eighteen domains (nusak) in the old political system on Rote Island, Eastern Indonesia.  ...  provide some major features of the story based on the flow and setting of both versions below.  ... 
doi:10.25911/5d7784b87d8fb fatcat:fchvdkk3cjhe3c2oqhzbl46qd4

Application-layer Fault-Tolerance Protocols [article]

Vincenzo De Florio
2016 arXiv   pre-print
Failing to address the application layer means leaving a backdoor open to problems such as design faults, interaction faults, or malicious attacks, whose consequences on the quality of service could be  ...  Application-level fault-tolerance is a sub-class of software fault-tolerance that focuses on the problems of expressing the problems and solutions of fault-tolerance in the top layer of the hierarchy of  ...  Let us denote with R the reliability of the basic component of the system, i.e., exp −λt , and R tmr as the reliability of the TMR system based on the same component.  ... 
arXiv:1611.02273v1 fatcat:my2uj2n2hrf4ljzpmbh4zlk57q

D6.1 System Orchestration And Management Design And Implementation

Carlos Parada, Isabel Borges, Francisco Fontes, George Tsolis, Michael J. McGrath, Vincenzo Riccobene, John Thomson, Julian Chesterfield, Joel Atherley, Manos Ragiadakos, Luis Tomas Bolivar, Livnat Peer (+13 others)
2018 Zenodo  
It concludes all the efforts done at WP6, finalizing the control framework, the SLA-base deployment design, and completes the symbolic execution checking and anomaly detection tools implementation.  ...  For example, when a tenant is suspected in malicious behaviour, one might test a few sequences of its data, even if belonging distant, possibly unrated time spans, or based on different features, and make  ...  We have applied the detection algorithms to the problems of malicious tools detection via system calls monitoring and data leakage identification.  ... 
doi:10.5281/zenodo.1232116 fatcat:sdtzshzkljbennvyyi7qklryby

Collaborative media streaming

Verena Kahmann, Lars Wolf, Jörg Ott
2009 ACM SIGMultimedia Records  
Dependent on the desired course of the session the control operation is executed for all users, or the group is split into subgroups to let watchers follow their own time-lines.  ...  on TV devices or computers in the home.  ...  The view on a virtual reality environment is classified into local and global perspective: In the local view, a user may act on the environment without change of the global state, whereas changes to the  ... 
doi:10.1145/1662529.1662535 fatcat:omijwpz65fcvfboxvxwntpsija

Shivering greedy snakes, gradient-guided in wavelet domain

M. Sakalli, Kin-Man Lam, Hong Yan
Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269)  
And the watcher is tricked into enclosed space and then trapped. In order to get out alive, the watcher must find the sealed opening in the wall. You are the watcher.  ...  An ado/aptive reading of Kelly's textual body maps an adopted body upon the wild colonial one.  ... 
doi:10.1109/icip.1998.723698 dblp:conf/icip/SakalliLY98 fatcat:ur6iqgldhjftjoqeznfdw6akhi

Intensional Cyberforensics [article]

Serguei A. Mokhov
2014 arXiv   pre-print
As a base implementation language model, we use in this approach a new dialect of the Lucid programming language, called Forensic Lucid, and we focus on defining hierarchical contexts based on intensional  ...  In large part, the language is based on its predecessor and codecessor Lucid dialects, such as GIPL, Indexical Lucid, Lucx, Objective Lucid, and JOOIP bound by the underlying intensional programming paradigm  ...  , or missions, networks via sharing and firmware updates locally or globally and on the deep web when multiple agencies and aircraft manufactures collaborate for scalability [277, 308] .  ... 
arXiv:1312.0466v2 fatcat:q5ovtsdzt5hqbn7rxpiobhjgzi

The Postmodern Sacred

Em McAvan
2010 Journal of Religion and Popular Culture  
Because it is largely textually based, the postmodern sacred is consumptive, and is necessarily entangled with the mechanics of postmodern global capitalism.  ...  a sequel on evangelical Christianity and how it informs the American spirit of global capitalism.  ...  Yet by theorising that texts both explicitly and implicitly construct inequitable power relations, such cultural theory has traced the ways in which textual practice translates into real-world marginality  ... 
doi:10.3138/jrpc.22.1.007 fatcat:j6q5eng66fa23nduo7bb7uhvre
« Previous Showing results 1 — 15 out of 99 results