Search Results

101 - 110 of 190 items :

  • Computer Sciences, other x
Clear All
SoK: Privacy on Mobile Devices – It’s Complicated

,” http://www.theverge.com/2014/9/1/6092089/nude-celebrity-hack, Sep. 2014. [19] B. Krebs, “The target breach, by the numbers,” Krebs on Security, vol. 6, 2014. [20] “Newly disclosed N.S.A. files detail partnerships with AT&T and Verizon,” The New York Times, 2015. [21] K. M. Sullivan, “But doctor, I still have both feet! Remedial problems faced by victims of medical identity theft,” American Journal of Law & Medicine, vol. 35, no. 4, 2009. [22] C. Apgar, G. Apple, L. Ayers, M. Berntsen, R. Busch, J

Open access
No Place to Hide: Inadvertent Location Privacy Leaks on Twitter

Proceedings of the 2017 ACM on Conference on Information and Knowledge Management , CIKM ’17, pages 1279–1288, New York, NY, USA, 2017. ACM. [13] N. Confessore. Cambridge Analytica and Facebook: The Scandal and the Fallout So Far, The New York Times. https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html , 2018. [14] M. Dredze, M. Osborne, and P. Kambadur. Geolocation for Twitter: Timing Matters. In NAACL-HLT , 2016. [15] D. Flatow, M. Naaman, K. E. Xie, Y. Volkovich, and Y. Kanza. On the accuracy of hyper

Open access
Expectation-Maximization Tensor Factorization for Practical Location Privacy Attacks

) Friendship and mobility: User movement in location-based social networks. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’11), pp 1082–1090 [8] Cichocki A, Zdunek R, Phan AH, Amari S (2009) Nonnegative Matrix and Tensor Factorizations: Applications to Exploratory Multi-way Data Analysis and Blind Source Separation. Wiley [9] Eagle N, Pentland A, Lazer D (2009) Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences (PNAS) 106

Open access
Don’t Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards

://developer.android.com/reference/android/app/ActivityManager.html#getRunningTasks%28int%29. [15] E. N. Forsythand and C. H. Martell, “Lexical and discourse analysis of online chat dialog,” in Proceedings of the International Conference on Semantic Computing, ICSC ’07, (Washington, DC, USA), pp. 19-26, IEEE Computer Society, 2007. [16] S. Bird, E. Klein, and E. Loper, Natural Language Processing with Python. O’Reilly Media, Inc., 1st ed., 2009. [17] J. Munkres, “Algorithms for the assignment and transportation problems,” 1957. [18] N. Zhang, K. Yuan, M. Naveed, X. Zhou, and X. Wang

Open access
Intra-seasonal Variability of Ball Speed and Coordination of Two Team-Handball Throwing Techniques in Elite Male Adolescent Players.

. Sports Medicine (Auckland, N.Z.) , 43 (3), 167–78. doi:10.1007/s40279-012-0011-z Stergiou, N., & Decker, L. M. (2011). Human movement variability, nonlinear dynamics, and pathology: is there a connection? Human Movement Science , 30 (5), 869–88. doi:10.1016/j.humov.2011.06.002 van den Tillaar, R., & Ettema, G. (2003). Instructions emphasizing velocity, accuracy or both on kinematics of overarm throwing by experienced team handball players. Perceptual and Motor Skills , 97 , 731–742. van den Tillaar, R., & Ettema, G. (2004). A force

Open access
A comparison of competitive profiles across the Spanish football leagues

soccer. Human Movement Science, 32 , 808–821. Bradley P.S., Bendiksen M., Dellal A., Mohr M., Wilkie A., Datson N., ... Krustrup P. (2014). The application of the Yo-Yo intermittent endurance level 2 test to elite female soccer populations. Scandinavian Journal of Medicine & Science in Sports, 24 (1), 43-54. Castagna, C., Impellizzeri, F., Cecchini, E., Rampinini, E., & Alvarez, J.C. (2009). Effects of intermittent-endurance fitness on match performance in young male soccer players. Journal of Strength and Conditioning Research, 23 (7), 1954

Open access
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing

, Izmir, Turkey, July 21-23, 2015 , pages 14–21, 2015. [25] V. Kolesnikov, R. Kumaresan, M. Rosulek, and N. Trieu. Efficient batched oblivious prf with applications to private set intersection. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security , pages 818–829. ACM, 2016. [26] V. Kolesnikov, R. Kumaresan, M. Rosulek, and N. Trieu. Efficient batched oblivious PRF with applications to private set intersection. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria

Open access
Urban area change visualization and analysis using high density spatial data from time series aerial images

plants that have grown over the years. Therefore, the population in Konya metropolitan area has recently increased very fast. The study area was defined by a rectangle with cross-corner of geographical coordinates of 37°53’26.67"N latitude, 32°28’37.38"E longitude and 37°52’38.30"N latitude, 32°29’39.11"E longitude. Its dimensions are 1.5 km × 1.5 km, or 2.25 km 2 . It largely includes houses and trade buildings, but it also includes tramway and railway networks, asphalt pavement, green fields and cemetery areas of Musalla ( Figure 1 ). Figure 1 Visualization

Open access
Privacy vs. Reward in Indoor Location-Based Services

. [7] D. P. D. Farias and N. Megiddo, “Combining expert advice in reactive environments,” J. ACM, vol. 53, no. 5, pp. 762-799, Sep. 2006. [Online]. Available: http://doi.acm.org/10.1145/1183907.1183911 [8] Apple Support, “iOS: Understanding iBeacon,” https://support.apple.com/en-gb/HT202880, Feb. 2015. [9] R. Rodrigues, D. Barnard-Wills, D. Wright, P. De Hert, V. Papakonstantinou, L. Beslay, E. JRC-IPSC, N. Dubois, and E. JUST, “EU privacy seals project,” Publications Office of the European Union, 2013. [10] P. Higgins

Open access
DP5: A Private Presence Service

–432. Springer, January 2003. [9] Dan Boneh, Ben Lynn, and Hovav Shacham. Short signatures from the Weil pairing. In Colin Boyd, editor, Advances in Cryptology—ASIACRYPT , number 2248 in Lecture Notes in Computer Science, pages 514–532. Springer, January 2001. [10] Philippe Boucher, Adam Shostack, and Ian Goldberg. Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems, Inc., December 2000. [11] Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich. How to win the clonewars: efficient periodic n

Open access