A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
THE EVOLUTION OF FACEBOOK'S GRAPH API
2020
Selected Papers of Internet Research, SPIR
Our empirical historical analysis of Facebook's Graph API is based on the entire corpus of available archived developer documentation held by the Internet Archive. ...
Facebook's application programming interfaces (APIs) enable third-party app developers to access data and functionality and have become central to many of the platform's ongoing data scandals and privacy ...
The platform responded by changing its policies, more strictly governing third-party data access via Facebook's Graph API, and by removing particular targeting options from Facebook's Marketing API for ...
doi:10.5210/spir.v2020i0.11185
fatcat:llmem7kujnar3hb2nutl2ssqr4
An analysis of Facebook photo caching
2013
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles - SOSP '13
of photo requests are routed to remote PoPs and data centers as a consequence both of load-balancing and peering policy, (3) demonstrate the potential performance benefits of coordinating Edge Caches ...
Facebook's image-management infrastructure is complex and geographically distributed. ...
Our paper explores the dynamics of the full Facebook photo-serving stack, from the client browser to Facebook's Haystack storage server, looking both at the performance of each layer and at interactions ...
doi:10.1145/2517349.2522722
dblp:conf/sosp/HuangBRLKL13
fatcat:e75ld3wtffc6pgtcd6ckan227u
Engineering Egress with Edge Fabric
2017
Proceedings of the Conference of the ACM Special Interest Group on Data Communication - SIGCOMM '17
We describe how Edge Fabric operates in near real-time to avoid congesting links at the edge of Facebook's network. ...
We relate challenges, solutions, and lessons from four years of operating and evolving Edge Fabric. ...
TOWARDS PERFORMANCE-AWARE ROUTING Edge Fabric avoids performance problems due to congested links at the edge of Facebook's network. ...
doi:10.1145/3098822.3098853
dblp:conf/sigcomm/SchlinkerKCKMCQ17
fatcat:4hchvrwxdjc73o6o5ntix4m2j4
An analysis of Facebook's graph search
2014
2014 Information Security for South Africa
When a query is executed, the results from the search can reveal personal information of friends as well as strangers. ...
With the large number of users active on Facebook, an upgrade to Facebook's searching capability was made through the launch of graph search. ...
The data in Facebook's graph search is structured in a graph with nodes and edges. Nouns are represented by nodes, while verbs are represented by edges. ...
doi:10.1109/issa.2014.6950517
dblp:conf/issa/KhanM14
fatcat:vbmf454cgvh3vitlkn3ylj3k5m
Can we still avoid automatic face detection?
[article]
2020
arXiv
pre-print
We show that in general, state-of-the-art detectors can often find faces even if the subject wears occluding clothing or even if the uploader damages the photo to prevent faces from being detected. ...
This means darkening the image is not an effective way to hide faces -it hurts human performance without affecting Facebook's performance at all. ...
Consider a middle school student fighting Internet bullying, a member of a witness protection program, a whistleblower hiding from law enforcement, or an activist protesting their local government. ...
arXiv:1602.04504v2
fatcat:lpqjjjpgn5fjlmfz4a4cxaj2fq
Can we still avoid automatic face detection?
2016
2016 IEEE Winter Conference on Applications of Computer Vision (WACV)
We show that in general, state-of-the-art detectors can often find faces even if the subject wears occluding clothing or even if the uploader damages the photo to prevent faces from being detected. ...
This means darkening the image is not an effective way to hide faces -it hurts human performance without affecting Facebook's performance at all. ...
Consider a middle school student fighting Internet bullying, a member of a witness protection program, a whistleblower hiding from law enforcement, or an activist protesting their local government. ...
doi:10.1109/wacv.2016.7477452
dblp:conf/wacv/WilberSB16
fatcat:qszw5nhprbftbpxjjzwxuwl3f4
Optimization Of High Endurance Single Wing Uav
2016
Zenodo
Efforts to create worldwide internet accessibility are familiar pursuits to large scale companies such as Facebook with their Aquila project. ...
As part of this effort, Facebook's R&D department has been engineering a drone (dubbed Aquila) capable of beaming high speed Internet access to areas of the world that lack Internet access. ...
Introduction One of Facebook's latest endeavors involves connecting the world to the internet through the initiative called Internet.org. ...
doi:10.5281/zenodo.49616
fatcat:ec35aktwyrdn5cidytwxykkoou
Introduction: Social Buzz, Political Boom? Ethnographic Engagements with Digital Militancy
2012
Anthropological Quarterly
The office space itself becomes a site for the performance of the company's ethos-divided between its mythic "hacker" origin and its corporate present. ...
rather than cutting off Internet connectivity (as Mubarak did) is a more effective way to keep people off of the streets. ...
doi:10.1353/anq.2012.0042
fatcat:ksrgu4fzl5gs7bwxwpnjkxexm4
Facebook's Ears - Threats by Audio Discovery
2015
Zenodo
Facebook's methods have included, but were not limited to, flat out asking what our favourite movies or bands or restaurants were, then asking us if we've seen a particular movie, rolling out plugins for ...
Being able to access the microphone and eavesdrop from a remote location could yield quite the competitive edge. ...
They record what users are saying and perform useful tasks such as finding the best route to a nearby place or playing music on a streaming app. ...
doi:10.5281/zenodo.3521511
fatcat:t4uc6tifhbdzjclrabjisxwedm
Large Scale Studies of Memory, Storage, and Network Failures in a Modern Data Center
[article]
2019
arXiv
pre-print
Yet, the devices used in modern data centers fail due to a variety of causes, from faulty components to bugs to misconfiguration. ...
In this dissertation, we measure and model the device failures in a large scale Internet service company, Facebook. ...
From edge nodes, user traffic arrives at Facebook's data center regions through the backbone network. 2. ...
arXiv:1901.03401v1
fatcat:xizly26q6zebdovjosjpyw2o5q
An Overview of Facebook's Journey to Meta - A Case Study
2022
Zenodo
Machine learning (ML) is a technique for recognizing and drawing conclusions from data connections. ...
Findings: Based on the findings, it is clear that to provide high-quality service, Facebook uses leading edge artificial intelligence/machine learning technologies. ...
FINDINGS : Facebook is an epitome of the rise and growth of internet companies in the past decade. ...
doi:10.5281/zenodo.6479236
fatcat:f3olk2oybngevjmhc562ncyncq
The Anatomy of the Facebook Social Graph
[article]
2011
arXiv
pre-print
We compare our results with those from smaller social networks and find mostly, but not entirely, agreement on common structural network characteristics. ...
The sparsity of the network does not, however, imply that users are far from each other in Facebook's network. ...
As individuals bring their social relations online, the focal point of the internet is evolving from being a network of documents to being a network of people, and previously invisible social structures ...
arXiv:1111.4503v1
fatcat:mfjrldkkhzhhdoja6v3qmh5vem
Unveiling facebook
2008
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement conference - IMC '08
The viral growth of these social applications can potentially influence how content is produced and consumed in the future Internet. ...
Community: A community in a graph is a set of nodes such that the ratio of edges between these nodes, and edges from these nodes to nodes outside of this community is 'high' [13] . ...
An edge exists between two nodes A and B if A and B interacted directly with each other (i.e., performed an activity directly on each other) through the application. ...
doi:10.1145/1452520.1452527
dblp:conf/imc/NazirRC08
fatcat:djo4scbyo5chjoth5qwr3sviyi
Beyond the Cloud: Cyberphysical Systems
2013
IT Professional Magazine
They currently rely on other equally relevant leading-edge technologiesthe Internet of Things (IOT), mobile apps, and big data. ...
Relying on the Internet, clouds both influence how the Internet is used and are influenced by the Internet's use. ...
doi:10.1109/mitp.2013.24
fatcat:gvmgvjqm55h6pmrd54cdsihsqa
Participatory trouble: Towards an understanding of algorithmic structures on Facebook
2014
Cyberpsychology: Journal of Psychosocial Research on Cyberpspace
Acknowledgement The research for this article was made possible by financial support from the Bank of Sweden Tercentenary Foundation. ...
Third, the recency of each Edge is measured and a new Edge is considered more important than an old one. ...
from certain persons (in)visible. ...
doi:10.5817/cp2014-3-2
fatcat:zlqxrwufnjb2vp2mudsrmb5nii
« Previous
Showing results 1 — 15 out of 1,864 results