-
1
-
-
33644899655
-
A Demographic and Psychographic Profile of Heavy Internet Users and Users by Type of Internet Usage
-
Assael, H. (2005) "A Demographic and Psychographic Profile of Heavy Internet Users and Users by Type of Internet Usage," Journal of Advertising Research, 45:1: 93-123.
-
(2005)
Journal of Advertising Research
, vol.45
, Issue.1
, pp. 93-123
-
-
Assael, H.1
-
2
-
-
54149086326
-
Super Crunchers: Why Thinking-by-Numbers Is the New Way to Be Smart
-
Bantam
-
Ayers, I. (2007) Super Crunchers: Why Thinking-by-Numbers Is the New Way to Be Smart, Bantam.
-
(2007)
-
-
Ayers, I.1
-
3
-
-
0037282445
-
Personalised Advertising-Exploiting the Distributed User Profile
-
(Jan. 2003)
-
Bilchev, G. and Marston, D. (2003) "Personalised Advertising-Exploiting the Distributed User Profile," BT Technology Journal 21, 1 (Jan. 2003), 84-90.
-
(2003)
BT Technology Journal
, vol.21
, Issue.1
, pp. 84-90
-
-
Bilchev, G.1
Marston, D.2
-
4
-
-
0035019085
-
Implicit Interest Indicators.
-
In Proceedings of the 6th International Conference on Intelligent User Interfaces (Santa Fe, New Mexico, United States, January 14-17, 2001). IUI '01. ACM, New York, NY
-
Claypool, M., Le, P., Wased, M., and Brown, D. (2001) "Implicit Interest Indicators." In Proceedings of the 6th International Conference on Intelligent User Interfaces (Santa Fe, New Mexico, United States, January 14-17, 2001). IUI '01. ACM, New York, NY, 33-40.
-
(2001)
, pp. 33-40
-
-
Claypool, M.1
Le, P.2
Wased, M.3
Brown, D.4
-
5
-
-
84884123614
-
Engage Launches Profile Based Web-Wide Ad Network
-
Click Z (Oct. 13, 1999)
-
Click Z (1999) "Engage Launches Profile Based Web-Wide Ad Network," ClickZ (Oct. 13, 1999), http://www.clickz.com/216871.
-
(1999)
-
-
Click, Z.1
-
6
-
-
0034484385
-
A Review and Analysis of Commercial User Modeling Servers for Personalization on the World Wide Web
-
(Feb. 2000)
-
Fink, J. and Kobsa, A. (2000) "A Review and Analysis of Commercial User Modeling Servers for Personalization on the World Wide Web," User Modeling and User- Adapted Interaction 10, 2-3 (Feb. 2000), 209-49.
-
(2000)
User Modeling and User- Adapted Interaction
, vol.10
, Issue.2-3
, pp. 209-249
-
-
Fink, J.1
Kobsa, A.2
-
7
-
-
20344382508
-
Evaluating Implicit Measures to Improve Web Search
-
(Apr. 2005)
-
Fox, S., Karnawat, K., Mydland, M., Dumais, S., and White, T. (2005) "Evaluating Implicit Measures to Improve Web Search," ACM Trans. Inf. Syst. 23, 2 (Apr. 2005), 147-68.
-
(2005)
ACM Trans. Inf. Syst.
, vol.23
, Issue.2
, pp. 147-168
-
-
Fox, S.1
Karnawat, K.2
Mydland, M.3
Dumais, S.4
White, T.5
-
8
-
-
84883925271
-
Realizing Comprehensive User Profile as the Core Element of Adaptive and Personalized Communication Environments and Systems
-
The Computer Journal Advance Access published online on April 4, 2008
-
Germanakos P., Tsianos N., Lekkas Z., Mourlas C., and Samaras G. (2008) "Realizing Comprehensive User Profile as the Core Element of Adaptive and Personalized Communication Environments and Systems," The Computer Journal Advance Access published online on April 4, 2008.
-
(2008)
-
-
Germanakos, P.1
Tsianos, N.2
Lekkas, Z.3
Mourlas, C.4
Samaras, G.5
-
9
-
-
74549137182
-
Click Chain Model in Web Search
-
Proceedings of the 18th International Conference on World Wide Web, WWW-2009
-
Guo, F., Liu, C., Kannan, A., Minka, T., Taylor, M., Wang, Y., and Faloutsos, C. (2009) "Click Chain Model in Web Search," Proceedings of the 18th International Conference on World Wide Web, WWW-2009, 11-20.
-
(2009)
, pp. 11-20
-
-
Guo, F.1
Liu, C.2
Kannan, A.3
Minka, T.4
Taylor, M.5
Wang, Y.6
Faloutsos, C.7
-
10
-
-
77950930266
-
Beyond DCG: User Behavior as a Predictor of a Successful Search
-
Proceedings of the Third ACM International Conference on Web Search and Data Mining (New York: February 4-6, 2010). WSDM '10. ACM, New York
-
Hassan, A., Jones, R., and Klinkner, K. L. (2010) "Beyond DCG: User Behavior as a Predictor of a Successful Search," Proceedings of the Third ACM International Conference on Web Search and Data Mining (New York: February 4-6, 2010). WSDM '10. ACM, New York,: 221-30.
-
(2010)
, pp. 221-230
-
-
Hassan, A.1
Jones, R.2
Klinkner, K.L.3
-
11
-
-
84884108046
-
Preserving the Collective Expressions of the Human Consciousness
-
Query Log Analysis: Social and Technological Challenges: A Workshop at the 16th International World Wide Web Conference
-
Jansen, B. (2007) "Preserving the Collective Expressions of the Human Consciousness," Query Log Analysis: Social and Technological Challenges: A Workshop at the 16th International World Wide Web Conference.
-
(2007)
-
-
Jansen, B.1
-
12
-
-
34548215752
-
Search Engines that Learn from Implicit Feedback
-
(Aug. 2007)
-
Joachims, T. and Radlinski, F. (2007) "Search Engines that Learn from Implicit Feedback," Computer 40, 8 (Aug. 2007), 34-40.
-
(2007)
Computer
, vol.40
, Issue.8
, pp. 34-40
-
-
Joachims, T.1
Radlinski, F.2
-
13
-
-
78549234524
-
Behavioral Profiles for Advanced Email Features
-
Proceedings of the 18th International Conference on World Wide Web, WWW- 2009
-
Karagiannis, T. and Vojnovic, M. (2009) "Behavioral Profiles for Advanced Email Features," Proceedings of the 18th International Conference on World Wide Web, WWW- 2009, 711-20.
-
(2009)
, pp. 711-720
-
-
Karagiannis, T.1
Vojnovic, M.2
-
14
-
-
76749141779
-
Tech Titans Building Boom
-
IEEE-Spectrum Online
-
Katz, R. (2009) "Tech Titans Building Boom," IEEE-Spectrum Online, http://www.spectrum.ieee.org/feb09/7327.
-
(2009)
-
-
Katz, R.1
-
15
-
-
8644249427
-
Implicit Feedback for Inferring User Preference: A Bibliography
-
(Sep. 2003)
-
Kelly, D. and Teevan, J. (2003) Implicit Feedback for Inferring User Preference: A Bibliography. SIGIR Forum 37, 2 (Sep. 2003), 18-28.
-
(2003)
SIGIR Forum
, vol.37
, pp. 18-28
-
-
Kelly, D.1
Teevan, J.2
-
16
-
-
84883926511
-
You're Leaving a Digital Trail. What about Privacy?
-
The New York Times (Nov. 29, 2008)
-
Markoff, J. (2008) "You're Leaving a Digital Trail. What about Privacy?" The New York Times (Nov. 29, 2008), http://www.nytimes.com/2008/11/30/business/30privacy.html.
-
(2008)
-
-
Markoff, J.1
-
17
-
-
84883931566
-
China Reports It's Tied U.S. for Most Internet Users
-
USA Today. com, 4/24/2008
-
McDonald, J. (2008) "China Reports It's Tied U.S. for Most Internet Users," USA Today. com, 4/24/2008, http://www.usatoday.com/tech/products/2008-04-24-3250683510_x.htm.
-
(2008)
-
-
McDonald, J.1
-
19
-
-
70350607224
-
Names and Similarities on the Web: Fact Extraction in the Fast Lane
-
Proceedings of the 21st International Conference on Computational Linguistics and 44th Annual Meeting of the Association for Computational Linguistics (COLING-ACL-06)
-
Pasca, M., Lin, D., Bigham J., Lifchits, A., and Jain, A. (2006) "Names and Similarities on the Web: Fact Extraction in the Fast Lane," Proceedings of the 21st International Conference on Computational Linguistics and 44th Annual Meeting of the Association for Computational Linguistics (COLING-ACL-06), 809-16.
-
(2006)
, pp. 809-816
-
-
Pasca, M.1
Lin, D.2
Bigham, J.3
Lifchits, A.4
Jain, A.5
-
20
-
-
80155157518
-
Google Uncloaks Once-Secret Server
-
CNET News (Apr. 1, 2009)
-
Shankland, S. (2009) "Google Uncloaks Once-Secret Server," CNET News (Apr. 1, 2009), http://news.cnet.com/8301-1001_3-10209580-92.html.
-
(2009)
-
-
Shankland, S.1
-
21
-
-
84883971467
-
Evaluating Implicit Judgments from Image Search Interactions
-
Proceedings of the WebSci '09: Society On-Line
-
Smith, G., and Ashman, H. (2009) "Evaluating Implicit Judgments from Image Search Interactions," Proceedings of the WebSci '09: Society On-Line, 18-20.
-
(2009)
, pp. 18-20
-
-
Smith, G.1
Ashman, H.2
-
22
-
-
33745816398
-
Context-aided Human Recognition-Clustering
-
Proceedings of the 9th European Conference on Computer Vision
-
Song, Y., and Leung, T. (2006) "Context-aided Human Recognition-Clustering," Proceedings of the 9th European Conference on Computer Vision, 382-95.
-
(2006)
, pp. 382-395
-
-
Song, Y.1
Leung, T.2
-
23
-
-
84884084091
-
Interpreting User Inactivity on Search Results
-
Advances in Information Retrieval: Proceedings of the 32nd European Conference on IR Research (ECIR)
-
Stamou, S. and Efthimiadis, E. N. (2010) "Interpreting User Inactivity on Search Results," Advances in Information Retrieval: Proceedings of the 32nd European Conference on IR Research (ECIR).
-
(2010)
-
-
Stamou, S.1
Efthimiadis, E.N.2
-
24
-
-
84865396232
-
To Aim Ads, Web Is Keeping Closer Eye on You
-
The New York Times, March 10, 2008
-
Story, L. (2008) "To Aim Ads, Web Is Keeping Closer Eye on You," The New York Times, March 10, 2008, http://www.nytimes.com/2008/03/10/technology/10privacy.html.
-
(2008)
-
-
Story, L.1
-
25
-
-
84883942799
-
Method and Apparatus for Determining Behavioral Profile of a Computer User
-
Patent #5848396
-
Thomas G., Method and Apparatus for Determining Behavioral Profile of a Computer User. Patent #5848396.
-
-
-
Thomas, G.1
-
26
-
-
70449707892
-
Modular Data Centers: How to Design Them?
-
High-Performance Distributed Computing, Proceedings of the 1st ACM Workshop on Large-Scale System and Application Performance
-
Vishwanath, K., Greenberg, A., and Reed, D. (2009) "Modular Data Centers: How to Design Them?" High-Performance Distributed Computing, Proceedings of the 1st ACM Workshop on Large-Scale System and Application Performance, 3-10.
-
(2009)
, pp. 3-10
-
-
Vishwanath, K.1
Greenberg, A.2
Reed, D.3
-
27
-
-
84865656170
-
How Much Can Behavioral Targeting Help Online Advertising?
-
Proceedings of the 18th International Conference on World Wide Web, WWW-2009
-
Yan J., Liu N., Wang G., Zhang W., Jiang Y., and Chen Z. (2009) "How Much Can Behavioral Targeting Help Online Advertising?" Proceedings of the 18th International Conference on World Wide Web, WWW-2009, 261-70.
-
(2009)
, pp. 261-270
-
-
Yan, J.1
Liu, N.2
Wang, G.3
Zhang, W.4
Jiang, Y.5
Chen, Z.6
-
28
-
-
2942561631
-
Lifestyles of Online Gamers: A Psychographic Approach
-
Youn, S., Lee, M., and Doyle, K. (2003) "Lifestyles of Online Gamers: A Psychographic Approach," Journal of Interactive Advertising, 3:2.
-
(2003)
Journal of Interactive Advertising
, vol.3
, pp. 2
-
-
Youn, S.1
Lee, M.2
Doyle, K.3
-
29
-
-
84883983860
-
Yahoo, Verizon: Our Spy Capabilities Would 'Shock,' 'Confuse' Consumers
-
(Dec. 1, 2009)
-
Zetter, K. (2009) "Yahoo, Verizon: Our Spy Capabilities Would 'Shock,' 'Confuse' Consumers," www.wired.com (Dec. 1, 2009), http://www.wired.com/threatlevel/2009/12/wiretap-prices.
-
(2009)
-
-
Zetter, K.1
-
30
-
-
84884009641
-
Tour the World: Building a Web-Scale Landmark Recognition Engine
-
Computer Vision and Pattern Recognition Conference, 2009
-
Zheng, Y. T., Zhao, M., Song, Y., Adam, H., Buddemeir, U., Bissaco, A., Brucher, F., Chua, T. S., and Neven, H. (2009) "Tour the World: Building a Web-Scale Landmark Recognition Engine," Computer Vision and Pattern Recognition Conference, 2009.
-
(2009)
-
-
Zheng, Y.T.1
Zhao, M.2
Song, Y.3
Adam, H.4
Buddemeir, U.5
Bissaco, A.6
Brucher, F.7
Chua, T.S.8
Neven, H.9
-
31
-
-
84883992869
-
-
A recent job posting for Yahoo.com
-
A recent job posting for Yahoo.com: http://www.job.com/my.job/sup/appTo=32758541/p=1/jsOn=1.
-
-
-
-
33
-
-
34748856813
-
Affect Intensity Analysis of Dark Web Forums
-
Intelligence and Security Informatics, 2007 IEEE, May 23-24, 2007
-
Abbasi, A. (2007), "Affect Intensity Analysis of Dark Web Forums," Intelligence and Security Informatics, 2007 IEEE, May 23-24, 2007, 282-88.
-
(2007)
, pp. 282-288
-
-
Abbasi, A.1
-
34
-
-
84883905060
-
Extremist Groups Using Facebook, MySpace, YouTube to Recruit Members
-
ANI., ANI November 20th, 2008
-
ANI. (2008) "Extremist Groups Using Facebook, MySpace, YouTube to Recruit Members," ANI November 20th, 2008, http://www.thaindian.com/newsportal/india-news/extremist-groups-using-facebook-myspace-youtube-to-recruit-members_100121244.html.
-
(2008)
-
-
-
35
-
-
70349804705
-
Combining Social Network Analysis and Sentiment Analysis to Explore the Potential for Online Radicalisation
-
2009 International Conference on Advances in Social Network Analysis and Mining
-
Bermingham, A., Conway, M., McInerney, L., O'Hare, N., and Smeaton, A. (2009) "Combining Social Network Analysis and Sentiment Analysis to Explore the Potential for Online Radicalisation," 2009 International Conference on Advances in Social Network Analysis and Mining.
-
(2009)
-
-
Bermingham, A.1
Conway, M.2
McInerney, L.3
O'Hare, N.4
Smeaton, A.5
-
36
-
-
0040756397
-
Internet Forums as Influential Sources of Consumer Information
-
no. 3
-
Bickart, B., and Schindler, R. M. (2001) "Internet Forums as Influential Sources of Consumer Information," Journal of Interactive Marketing, vol. 15, no. 3, 31-40.
-
(2001)
Journal of Interactive Marketing
, vol.15
, pp. 31-40
-
-
Bickart, B.1
Schindler, R.M.2
-
37
-
-
84883935863
-
Reaching the Masses on Their Own Time: The Parallel between Viral Marketing and Psychological Operations
-
IOSphere: The Professional Journal of Joint Information Operations, Spring 2009
-
Blakely, K. (2009) "Reaching the Masses on Their Own Time: The Parallel between Viral Marketing and Psychological Operations," IOSphere: The Professional Journal of Joint Information Operations, Spring 2009, http://www.au.af.mil/info-ops/iosphere.htm.
-
(2009)
-
-
Blakely, K.1
-
38
-
-
80053539418
-
A Framework for Locating and Analyzing Hate Groups in Blogs
-
PACIS 2006 Proceedings
-
Chau, M. and Xu, J. (2006) "A Framework for Locating and Analyzing Hate Groups in Blogs," PACIS 2006 Proceedings, http://www.fbe.hku.hk/~mchau/papers/Blog_PACIS.pdf.
-
(2006)
-
-
Chau, M.1
Xu, J.2
-
39
-
-
33751163289
-
Mining Communities and Their Relationships in Blogs: A Study of Online Hate Groups
-
no. 1 (Jan. 2007)
-
Chau, M. and Xu, J. (2007) "Mining Communities and Their Relationships in Blogs: A Study of Online Hate Groups," Int. J. Hum.-Comput. Stud., vol. 65, no. 1 (Jan. 2007), 57-70.
-
(2007)
Int. J. Hum.-Comput. Stud.
, vol.65
, pp. 57-70
-
-
Chau, M.1
Xu, J.2
-
40
-
-
3042643762
-
Making a Global Community on the Net-Global Village or Global Metropolis?: A Network Analysis of Usenet Newsgroups
-
no. 3
-
Choi, J. and Danowski, J. (2002) "Making a Global Community on the Net-Global Village or Global Metropolis?: A Network Analysis of Usenet Newsgroups," Journal of Computer-Mediated Communication, vol. 7, no. 3.
-
(2002)
Journal of Computer-Mediated Communication
, vol.7
-
-
Choi, J.1
Danowski, J.2
-
41
-
-
84884039116
-
Terrorism and the Making of the 'New Middle East': New Media Strategies of Hizbolla and al Qaeda
-
in Seib, Philip (ed.) New Media and the New Middle East, Palgrave Macmillan
-
Conway, M. (2007) "Terrorism and the Making of the 'New Middle East': New Media Strategies of Hizbolla and al Qaeda," in Seib, Philip (ed.) New Media and the New Middle East, Palgrave Macmillan.
-
(2007)
-
-
Conway, M.1
-
42
-
-
31244436629
-
Information Warfare: New Battlefields Terrorists, Propaganda, and the Internet
-
Aslib Proceedings (Jul./Aug. 2001)
-
Crilley, K. (2001) "Information Warfare: New Battlefields Terrorists, Propaganda, and the Internet," Aslib Proceedings (Jul./Aug. 2001), 53, 7.
-
(2001)
, vol.53
, pp. 7
-
-
Crilley, K.1
-
43
-
-
0035641610
-
Social Implications of the Internet
-
DiMaggio P., Hargittai E., Neuman, W., and Robinson J. (2001) "Social Implications of the Internet," Annual Review of Sociology (2001), 27.
-
(2001)
Annual Review of Sociology
, pp. 27
-
-
DiMaggio, P.1
Hargittai, E.2
Neuman, W.3
Robinson, J.4
-
44
-
-
14744278261
-
Using Data Mining as a Strategy for Assessing Asynchronous Discussion Forums
-
(Aug. 2005)
-
Dringus, L. P. and Ellis, T. (2005) "Using Data Mining as a Strategy for Assessing Asynchronous Discussion Forums," Comput. Educ. 45, 1 (Aug. 2005), 141-60.
-
(2005)
Comput. Educ.
, vol.45
, Issue.1
, pp. 141-160
-
-
Dringus, L.P.1
Ellis, T.2
-
45
-
-
84884016592
-
Social Networking Services: The New Influence Frontier
-
IOSphere: The Professional Journal of Joint Information Operations. Winter, 2009
-
Efaw, J. M. (2009) "Social Networking Services: The New Influence Frontier," IOSphere: The Professional Journal of Joint Information Operations. Winter, 2009. http://www.au.af.mil/info-ops/iosphere.htm.
-
(2009)
-
-
Efaw, J.M.1
-
46
-
-
84884055586
-
Wonders of Internet Now in Remote Villages
-
EFYtimes.com
-
EFYtimes.com. (2007) "Wonders of Internet Now in Remote Villages," EFYtimes.com, http://www.efytimes.com/efytimes/fullnews.asp?edid=18592.
-
(2007)
-
-
-
47
-
-
85045164277
-
Hate Online: A Content Analysis of Extremist Internet Sites
-
no. 1
-
Gerstenfeld, P. B., Grant D. R., and Chiang, C. P. (2003) "Hate Online: A Content Analysis of Extremist Internet Sites," Analyses of Social Issues and Public Policy, vol. 3, no. 1, 29-44.
-
(2003)
Analyses of Social Issues and Public Policy
, vol.3
, pp. 29-44
-
-
Gerstenfeld, P.B.1
Grant, D.R.2
Chiang, C.P.3
-
48
-
-
84884072726
-
Depression, the Internet, and Ethnography: A Study of Online Support Forums and the Methodology Used.
-
A thesis presented in partial fulfillment of the requirements for a Master of Arts degree in Social Anthropology at Massey University, Albany Campus
-
Hawkey, M. A. (2008) "Depression, the Internet, and Ethnography: A Study of Online Support Forums and the Methodology Used." A thesis presented in partial fulfillment of the requirements for a Master of Arts degree in Social Anthropology at Massey University, Albany Campus, http://muir.massey.ac.nz/handle/10179/618.
-
(2008)
-
-
Hawkey, M.A.1
-
49
-
-
0037409655
-
Sustainable Internet Access for the Rural Poor? Elements of an Emerging Indian Model
-
James, M. (2003) "Sustainable Internet Access for the Rural Poor? Elements of an Emerging Indian Model," Futures, 35, 461-72.
-
(2003)
Futures
, vol.35
, pp. 461-472
-
-
James, M.1
-
50
-
-
10944237726
-
Wag the Blog: How Reliance on Traditional Media and the Internet Influence Credibility Perceptions of Weblogs among Blog Users
-
no. 3 (Autumn 2004)
-
Johnson, T. and Kaye, B. (2004) "Wag the Blog: How Reliance on Traditional Media and the Internet Influence Credibility Perceptions of Weblogs among Blog Users," Journalism & Mass Communication Quarterly, vol. 81, no. 3 (Autumn 2004), 622-42.
-
(2004)
Journalism & Mass Communication Quarterly
, vol.81
, pp. 622-642
-
-
Johnson, T.1
Kaye, B.2
-
51
-
-
84884078882
-
Lawyer: FBI Paid Right-Wing Blogger Charged with Threats
-
August 19, 2009
-
Kravets, D. (2009) "Lawyer: FBI Paid Right-Wing Blogger Charged with Threats," www.wired.com, August 19, 2009, http://www.wired.com/threatlevel/2009/08/lawyerfbi-paid-right-wing-blogger-charged-with-threats/.
-
(2009)
-
-
Kravets, D.1
-
52
-
-
84884022495
-
Communication Across Borders: Experiences of Rural Indian Women in Using Cyber Cafes.
-
Paper presented at the annual meeting of the International Communication Association
-
Krishnamurthy, S. (2003) "Communication Across Borders: Experiences of Rural Indian Women in Using Cyber Cafes." Paper presented at the annual meeting of the International Communication Association.
-
(2003)
-
-
Krishnamurthy, S.1
-
53
-
-
18744382605
-
The Internet and Socioeconomic Development: Exploring the Interaction
-
no. 2
-
Madon, S. (2000) "The Internet and Socioeconomic Development: Exploring the Interaction," Information Technology and People, vol. 13, no. 2, 85-101.
-
(2000)
Information Technology and People
, vol.13
, pp. 85-101
-
-
Madon, S.1
-
54
-
-
84863737619
-
Bringing the Internet to Remote African Villages
-
The New York Times
-
Nicholson, C. (2009) "Bringing the Internet to Remote African Villages," The New York Times, http://www.nytimes.com/2009/02/02/technology/internet/02kenya.html.
-
(2009)
-
-
Nicholson, C.1
-
55
-
-
84884011633
-
The Devil's Long Tail: Religious Moderation and Extremism on the Web
-
Proceedings of the WebSci '09: Society On-Line
-
O'Hara, K. and Stevons, D. (2009) "The Devil's Long Tail: Religious Moderation and Extremism on the Web," Proceedings of the WebSci '09: Society On-Line.
-
(2009)
-
-
O'Hara, K.1
Stevons, D.2
-
56
-
-
52549127012
-
Recruitment by Extremist Groups on the Internet
-
no. 2
-
Ray, B. and Marsh, G. E. (2001) "Recruitment by Extremist Groups on the Internet," First Monday, vol. 6, no. 2. http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/834.
-
(2001)
First Monday
, vol.6
-
-
Ray, B.1
Marsh, G.E.2
-
57
-
-
3042669232
-
Spinning the Web of Hate: Web-Based Hate Propagation by Extremist Organizations
-
no. 2 (2002)
-
Schafer, J. (2002) "Spinning the Web of Hate: Web-Based Hate Propagation by Extremist Organizations," Journal of Criminal Justice and Popular Culture, vol. 9, no. 2 (2002), 69-88, http://www.albany.edu/scj/jcjpc/vol9is2/schafer.html.
-
(2002)
Journal of Criminal Justice and Popular Culture
, vol.9
, pp. 69-88
-
-
Schafer, J.1
-
58
-
-
14744291472
-
Hate and the Internet
-
Policy Archive
-
Sterns, K. (1999) "Hate and the Internet," Policy Archive, http://hdl.handle.net/10207/13673.
-
(1999)
-
-
Sterns, K.1
-
59
-
-
84884010527
-
Hezballah, Israel, and Cyber PSYOP
-
IOSphere: The Professional Journal of Joint Information Operations, (Winter 2007)
-
Thomas, T. (2007) "Hezballah, Israel, and Cyber PSYOP," IOSphere: The Professional Journal of Joint Information Operations, (Winter 2007), http://www.au.af.mil/info-ops/iosphere.htm.
-
(2007)
-
-
Thomas, T.1
-
60
-
-
85048941387
-
Al Qaeda and the Internet: The Danger of 'CyberPlanning,'
-
Thomas, T. (2003) "Al Qaeda and the Internet: The Danger of 'CyberPlanning,' " Parameters, vol. 33.
-
(2003)
Parameters
, vol.33
-
-
Thomas, T.1
-
61
-
-
84884066369
-
Hate and the Internet Curriculum
-
document created for Gonzaga University Institute for Action Against Hate
-
Veile, B. (2003) "Hate and the Internet Curriculum," document created for Gonzaga University Institute for Action Against Hate, http://guweb2.gonzaga.edu/againsthate/hateandInternet.pdf.
-
(2003)
-
-
Veile, B.1
-
62
-
-
85007856441
-
Stratagems and Heuristics in the Recruitment of Children into Communities of Hate: The Fabric of Our Future Nightmares
-
no. 1
-
Waltman, M. (2003) "Stratagems and Heuristics in the Recruitment of Children into Communities of Hate: The Fabric of Our Future Nightmares," Southern Communication Journal, vol. 69, no. 1, 22-36.
-
(2003)
Southern Communication Journal
, vol.69
, pp. 22-36
-
-
Waltman, M.1
-
63
-
-
84884090149
-
Advertising Hate on the Internet
-
in Internet Advertising: Theory and Research, D. Schumann, E. Thorson (eds), Lawrence Erlbaum & Associates Publishers
-
Waltman, M. and Haas, J. (2007) "Advertising Hate on the Internet," in Internet Advertising: Theory and Research, D. Schumann, E. Thorson (eds), Lawrence Erlbaum & Associates Publishers.
-
(2007)
-
-
Waltman, M.1
Haas, J.2
-
64
-
-
85008065682
-
US Domestic Extremist Groups on the Web: Link and Content Analysis
-
no. 5
-
Zhou, Y., Reid, E., Qin, J., Chen, H., Lai, G. (2005) "US Domestic Extremist Groups on the Web: Link and Content Analysis," IEEE Intelligent Systems, vol. 20, no. 5, 44-51.
-
(2005)
IEEE Intelligent Systems
, vol.20
, pp. 44-51
-
-
Zhou, Y.1
Reid, E.2
Qin, J.3
Chen, H.4
Lai, G.5
-
65
-
-
33745913605
-
Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums
-
Proceedings of the IEEE International Conference on Intelligence and Security (ISI 2006), San Diego, CA, May 23-24, 2006
-
Zhou, Y., Qin, J., Lai, G., Reid, E., and Chen, H. (2006) "Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums," Proceedings of the IEEE International Conference on Intelligence and Security (ISI 2006), San Diego, CA, May 23-24, 2006.
-
(2006)
-
-
Zhou, Y.1
Qin, J.2
Lai, G.3
Reid, E.4
Chen, H.5
-
66
-
-
84884077599
-
Groups Linked to September 11 Hijackers Spark Fury over Conference
-
Telegraph.co.uk, Dec. 28, 2008
-
Rayner, G. (2008) "Groups Linked to September 11 Hijackers Spark Fury over Conference," Telegraph.co.uk, Dec. 28, 2008, http://www.telegraph.co.uk/news/uknews/3966501/Muslim-groups-linked-to-September-11-hijackers-spark-fury-over-conference.html.
-
(2008)
-
-
Rayner, G.1
-
67
-
-
84883899190
-
AOL, Bloomberg, UBS, and NSA Announced as Sponsors/Patrons of 2006 TopCoder Collegiate Challenge: UBS and National Security Agency Continue Involvement with Leading Collegiate Computer Programming Contest
-
TopCoder., Press Release June 6, 2006, TopCoder.com
-
TopCoder. (2006) "AOL, Bloomberg, UBS, and NSA Announced as Sponsors/Patrons of 2006 TopCoder Collegiate Challenge: UBS and National Security Agency Continue Involvement with Leading Collegiate Computer Programming Contest," Press Release June 6, 2006, TopCoder.com, http://www.topcoder.com/tc?module=Static&d1=pressroom&d2=pr_060606.
-
(2006)
-
-
-
68
-
-
84884082231
-
Students from Russian Federation, China, Indonesia, and United States Win 2007 TopCoder Collegiate Challenge
-
TopCoder., Press Release November 5, 2007, TopCoder.com
-
TopCoder. (2007) "Students from Russian Federation, China, Indonesia, and United States Win 2007 TopCoder Collegiate Challenge," Press Release November 5, 2007, TopCoder.com, http://www.topcoder.com/tc?module=Static&d1=pressroom&d2=pr_110507.
-
(2007)
-
-
-
69
-
-
12244275962
-
TiVo: Making Show Recommendations Using a Distributed Collaborative Filtering Architecture
-
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (Seattle, WA, Aug. 22-25, 2004). KDD '04. ACM, New York
-
Ali, K. and van Stam, W. (2004) "TiVo: Making Show Recommendations Using a Distributed Collaborative Filtering Architecture," Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (Seattle, WA, Aug. 22-25, 2004). KDD '04. ACM, New York, 394-401.
-
(2004)
, pp. 394-401
-
-
Ali, K.1
Van Stam, W.2
-
70
-
-
45749099677
-
Enron Email Dataset
-
Carnegie Mellon University web site
-
Cohen, W. (2005) "Enron Email Dataset," Carnegie Mellon University web site, http://www.cs.cmu.edu/~enron/.
-
(2005)
-
-
Cohen, W.1
-
71
-
-
84883906304
-
Using Context to Improve Query Formulation and Entry from Mobile Phones
-
thesis, Computer Science, Columbia University
-
Kamvar, M. (2008) "Using Context to Improve Query Formulation and Entry from Mobile Phones," thesis, Computer Science, Columbia University, http://www.maryamkamvar.com/publications/Kamvar.pdf.
-
(2008)
-
-
Kamvar, M.1
-
72
-
-
70549088230
-
The Role of Context in Query Input: Using Contextual Signals to Complete Queries on Mobile Devices
-
Proceedings of Mobile HCI
-
Kamvar, M. and Baluja, S. (2007) "The Role of Context in Query Input: Using Contextual Signals to Complete Queries on Mobile Devices," Proceedings of Mobile HCI.
-
(2007)
-
-
Kamvar, M.1
Baluja, S.2
-
73
-
-
57649196022
-
Query Suggestions for Mobile Search: Understanding Usage Patterns
-
CHI '08: Proceedings of the Twenty-Sixth Annual SIGCHI Conference on Human Factors in Computing Systems. New York: ACM
-
Kamvar, M. and Baluja, S. (2008) "Query Suggestions for Mobile Search: Understanding Usage Patterns," CHI '08: Proceedings of the Twenty-Sixth Annual SIGCHI Conference on Human Factors in Computing Systems. New York: ACM, 1013-16.
-
(2008)
, pp. 1013-1016
-
-
Kamvar, M.1
Baluja, S.2
-
74
-
-
20444491277
-
Email Archive Analysis through Graphical Visualization
-
Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (Washington, DC, Oct. 29)
-
Li, W., Hershkop, S., and Stolfo, S. J. (2004) "Email Archive Analysis through Graphical Visualization," Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security (Washington, DC, Oct. 29).
-
(2004)
-
-
Li, W.1
Hershkop, S.2
Stolfo, S.J.3
-
75
-
-
70450140870
-
Analyzing Behavioral Features for Email Classification
-
Second Conference on Email and Anti-Spam (CEAS 2005)
-
Martin, S., Sewani, A., Nelson, B., Chen, K., and Joseph, A. D. (2005) "Analyzing Behavioral Features for Email Classification," Second Conference on Email and Anti-Spam (CEAS 2005).
-
(2005)
-
-
Martin, S.1
Sewani, A.2
Nelson, B.3
Chen, K.4
Joseph, A.D.5
-
76
-
-
33747144912
-
Behavior-based Modeling and Its Application to Email Analysis
-
Stolfo, S. J., Hershkop, S., Hu, C., Li, W., Nimeskern, O., and Wang, K. (2006) "Behavior-based Modeling and Its Application to Email Analysis," ACM Trans. Internet Technol., 6, 2.
-
(2006)
ACM Trans. Internet Technol.
, vol.6
, pp. 2
-
-
Stolfo, S.J.1
Hershkop, S.2
Hu, C.3
Li, W.4
Nimeskern, O.5
Wang, K.6
-
77
-
-
10844281465
-
Email as Spectroscopy: Automated Discovery of Community Structure within Organizations
-
Communities and Technologies, Huysman, M., Wenger, E., and Wulf, V. (eds.), Kluwer B., Deventer V., The Netherlands
-
Tyler, J. R., Wilkinson, D. M., and Huberman, B. A. (2003) "Email as Spectroscopy: Automated Discovery of Community Structure within Organizations," Communities and Technologies, Huysman, M., Wenger, E., and Wulf, V. (eds.), Kluwer B., Deventer V., The Netherlands, 81-96.
-
(2003)
, pp. 81-96
-
-
Tyler, J.R.1
Wilkinson, D.M.2
Huberman, B.A.3
-
78
-
-
84864751602
-
If TiVo Thinks You Are Gay, Here's How to Set It Straight
-
The Wall Street Journal Digital Network, Tuesday November 26, 2002
-
Zaslow, J. (2002) "If TiVo Thinks You Are Gay, Here's How to Set It Straight," The Wall Street Journal Digital Network, Tuesday November 26, 2002, http://online.wsj.com/article_email/SB1038261936872356908.html.
-
(2002)
-
-
Zaslow, J.1
-
79
-
-
84884121834
-
Technology Gets Personal: Can Algorithms Predict Our Tastes in Movies and Books?
-
The Wall Street Journal Digital Network, July 18, 2008
-
Zeitchik, S. (2008) "Technology Gets Personal: Can Algorithms Predict Our Tastes in Movies and Books?" The Wall Street Journal Digital Network, July 18, 2008, http://online.wsj.com/article/SB121633741917263835.html.
-
(2008)
-
-
Zeitchik, S.1
-
80
-
-
84883934303
-
Consumer Watchdog Wrong on Medical Records Claim
-
Google Public Policy Blog
-
Chavez, P. (2009) "Consumer Watchdog Wrong on Medical Records Claim," Google Public Policy Blog, http://googlepublicpolicy.blogspot.com/2009/01/consumer-watchdog-wrongon-medical.html.
-
(2009)
-
-
Chavez, P.1
-
81
-
-
84883986720
-
The Future with Electronic Medical Records: Effective, Flexible, Affordable: Hospitals, Physicians Need Systems that Share Information, Require Less Training, Reduce Log-in Headaches
-
Crounse, B. (2006) "The Future with Electronic Medical Records: Effective, Flexible, Affordable: Hospitals, Physicians Need Systems that Share Information, Require Less Training, Reduce Log-in Headaches," http://www.microsoft.com/industry/healthcare/providers/businessvalue/housecalls/clinicalworkflow.mspx.
-
(2006)
-
-
Crounse, B.1
-
82
-
-
84884033436
-
Microsoft Plans Medical-Record Service
-
CNET News, Oct. 4, 2007
-
Fried, I. (2007) "Microsoft Plans Medical-Record Service," CNET News, Oct. 4, 2007, http://news.cnet.com/Microsoft-plans-medical-record-service/2100-1011_3-6211575.html.
-
(2007)
-
-
Fried, I.1
-
83
-
-
84883991324
-
Microsoft, Google, Consumers Endorse Health Privacy Standards
-
Bloomberg (June 25, 2008)
-
Goldstein, A. (2008) "Microsoft, Google, Consumers Endorse Health Privacy Standards," Bloomberg (June 25, 2008), http://www.bloomberg.com/apps/news?pid=20601087&sid=a38Kg3O.d86k.
-
(2008)
-
-
Goldstein, A.1
-
84
-
-
84883939252
-
-
Google Health. (2009) http://www.google.com/health.
-
(2009)
-
-
Google, Health.1
-
85
-
-
84884002186
-
Electronic Medical Records: Will Your Privacy Be Safe?
-
U.S. News & World Report, USNews.com (Feb. 17, 2009)
-
Healy, B. (2009) "Electronic Medical Records: Will Your Privacy Be Safe?" U.S. News & World Report, USNews.com (Feb. 17, 2009), http://www.usnews.com/health/blogs/heart-to-heart/2009/02/17/electronic-medical-records-will-your-privacybe-safe.html.
-
(2009)
-
-
Healy, B.1
-
86
-
-
84883992926
-
Electronic Health Records: What's Taking So Long?
-
Time, Health & Science (Mar. 25, 2009),
-
Kluger, J. (2009) "Electronic Health Records: What's Taking So Long?" Time, Health & Science (Mar. 25, 2009), www.time.com, http://www.time.com/time/health/article/0,8599,1887658,00.html.
-
(2009)
-
-
Kluger, J.1
-
87
-
-
3242806004
-
Lessons and Challenges from Mining Retail E-Commerce Data
-
Machine Learning 57
-
Kohavi, R., Mason, L., Parekh, R., and Zheng, Z. (2004) "Lessons and Challenges from Mining Retail E-Commerce Data," Machine Learning 57, 1-2, 83-113.
-
(2004)
-
-
Kohavi, R.1
Mason, L.2
Parekh, R.3
Zheng, Z.4
-
88
-
-
84884024402
-
Where's Search Heading? Ask Yahoo's Chief Scientist
-
Search Engine Watch, March 20, 2008
-
Newcomb, K. (2008) "Where's Search Heading? Ask Yahoo's Chief Scientist," Search Engine Watch, March 20, 2008, http://searchenginewatch.com/3628767.
-
(2008)
-
-
Newcomb, K.1
-
89
-
-
84884081638
-
Ad Buyers Bulk Up Spending as Consumers Diet
-
Nielsen Wire (Jan. 13, 2009)
-
Nielsen Wire. (2009) "Ad Buyers Bulk Up Spending as Consumers Diet," Nielsen Wire (Jan. 13, 2009), http://blog.nielsen.com/nielsenwire/consumer/ad-buyers-bulk-upspending-as-consumers-diet/.
-
(2009)
-
-
Nielsen, W.1
-
90
-
-
84884008356
-
ISPs Collect User Data for Behavioral Ad Targeting
-
ClickZ (Jan. 3, 2008)
-
Rodgers, Z. (2008) "ISPs Collect User Data for Behavioral Ad Targeting," ClickZ (Jan. 3, 2008), http://www.clickz.com/3628004.
-
(2008)
-
-
Rodgers, Z.1
-
91
-
-
33747351645
-
Mining Web Browsing Patterns for E-commerce
-
(Sep. 2006)
-
Song, Q. and Shepperd, M. (2006) "Mining Web Browsing Patterns for E-commerce," Computers in Industry 57, 7 (Sep. 2006), 622-30.
-
(2006)
Computers in Industry
, vol.57
, Issue.7
, pp. 622-630
-
-
Song, Q.1
Shepperd, M.2
-
92
-
-
84883955099
-
Is Google's Cafeteria a Competitive Weapon?
-
Wisconsin Technology Network, WTN News (Aug. 30, 2005)
-
DiRomualdo, T. (2005) "Is Google's Cafeteria a Competitive Weapon?" Wisconsin Technology Network, WTN News (Aug. 30, 2005), http://wistechnology.com/articles/2190/.
-
(2005)
-
-
DiRomualdo, T.1
-
93
-
-
84884114462
-
Inside the Café at Facebook Headquarters
-
Food Gal: Musings on Food, Wine, Laughter and Life
-
Jung, C. (2009) "Inside the Café at Facebook Headquarters," Food Gal: Musings on Food, Wine, Laughter and Life, http://www.foodgal.com/2009/08/inside-the-cafe-atfacebook-headquarters/.
-
(2009)
-
-
Jung, C.1
-
94
-
-
84883901991
-
Don't Touch My Perks: Companies that Eliminate Them Risk Employee Backlash
-
Knowledge@Wharton., FTPress, Financial Times (Sept. 25, 2008)
-
Knowledge@Wharton. (2008) "Don't Touch My Perks: Companies that Eliminate Them Risk Employee Backlash," FTPress, Financial Times (Sept. 25, 2008), http://www.ftpress.com/articles/article.aspx?p=1235052.
-
(2008)
-
-
-
95
-
-
84884041996
-
Silicon Valley Lab Internship Program
-
Microsoft
-
Microsoft. (2010) "Silicon Valley Lab Internship Program," http://research.microsoft.com/en-us/jobs/intern/about_ca.aspx.
-
(2010)
-
-
-
96
-
-
84883997583
-
Wooing Interns to Silicon Valley
-
cNet.com (July 3, 2007)
-
Olsen, S. (2007) "Wooing Interns to Silicon Valley," cNet.com (July 3, 2007), http://news.cnet.com/Wooing-interns-to-Silicon-Valley/2100-1014_3-6194777.html.
-
(2007)
-
-
Olsen, S.1
-
97
-
-
84883914579
-
Tray Chic: At Work, Cool Cafeterias, Imaginative Menus
-
The Seattle Times (Nov. 21, 2005)
-
Ramirez, M. (2005) "Tray Chic: At Work, Cool Cafeterias, Imaginative Menus," The Seattle Times (Nov. 21, 2005), http://seattletimes.nwsource.com/html/living/2002634266_cafes21.html.
-
(2005)
-
-
Ramirez, M.1
-
98
-
-
3042731750
-
Web Mining for Web Personalization
-
ACM Trans. Internet Technol., 3, 1
-
Eirinaki, M. and Vazirgiannis, M. (2003) "Web Mining for Web Personalization," ACM Trans. Internet Technol., 3, 1, 1-27.
-
(2003)
, pp. 1-27
-
-
Eirinaki, M.1
Vazirgiannis, M.2
-
99
-
-
35348815641
-
Demographic Prediction Based on User's Browsing Behavior
-
Proceedings of the 16th International Conference on World Wide Web
-
Hu, J., Zeng, H., Li, H., Niu, C., and Chen, Z. (2007) "Demographic Prediction Based on User's Browsing Behavior," Proceedings of the 16th International Conference on World Wide Web, http://www2007.org/papers/paper686.pdf.
-
(2007)
-
-
Hu, J.1
Zeng, H.2
Li, H.3
Niu, C.4
Chen, Z.5
-
100
-
-
63449090629
-
I Know What You Did Last Summer: Query Logs and User Privacy
-
Proceedings of the Sixteenth ACM Conference on Conference on information and Knowledge Management
-
Jones, R., Kumar, R., Pang, B., and Tomkins, A. (2007) "I Know What You Did Last Summer: Query Logs and User Privacy," Proceedings of the Sixteenth ACM Conference on Conference on information and Knowledge Management.
-
(2007)
-
-
Jones, R.1
Kumar, R.2
Pang, B.3
Tomkins, A.4
-
101
-
-
0037252945
-
Amazon.com Recommendations
-
IEEE Internet Computing 7, no. 1 (Jan.-Feb. 2003)
-
Linden, G., Smith, B., and York, J. (2003) "Amazon.com Recommendations," IEEE Internet Computing 7, no. 1 (Jan.-Feb. 2003), 76-80.
-
(2003)
, pp. 76-80
-
-
Linden, G.1
Smith, B.2
York, J.3
-
102
-
-
0031104254
-
Recommender Systems
-
(Mar. 1997)
-
Resnick, P. and Varian, H. R. (1997) "Recommender Systems," Communications of the ACM 40, 3 (Mar. 1997), 56-58.
-
(1997)
Communications of the ACM
, vol.40
, Issue.3
, pp. 56-58
-
-
Resnick, P.1
Varian, H.R.2
-
103
-
-
62149116834
-
A Peer-to-Peer Recommender System Based on Spontaneous Affinities
-
Ruffo, G., and Schifanella, R. (2009) "A Peer-to-Peer Recommender System Based on Spontaneous Affinities," ACM Trans. Internet Technol., 9, 1.
-
(2009)
ACM Trans. Internet Technol.
, vol.9
, pp. 1
-
-
Ruffo, G.1
Schifanella, R.2
-
104
-
-
32344452531
-
Evaluating Similarity Measures: A Large-Scale Study in the Orkut Social Network
-
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining
-
Spertus, E., Sahami, M., and Buyukkokten, O. (2005) "Evaluating Similarity Measures: A Large-Scale Study in the Orkut Social Network," Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining.
-
(2005)
-
-
Spertus, E.1
Sahami, M.2
Buyukkokten, O.3
-
105
-
-
33645341816
-
Collaborative Filtering Enhanced by Demographic Correlation
-
presented at the AIAI Symposium on Professional Practice in AI, of the 18th World Computer Congress, Toulouse, France, August 22-27, 2004
-
Vozalis, M. G. and Margaritis, K. G. (2004) "Collaborative Filtering Enhanced by Demographic Correlation," presented at the AIAI Symposium on Professional Practice in AI, of the 18th World Computer Congress, Toulouse, France, August 22-27, 2004, 393-402.
-
(2004)
, pp. 393-402
-
-
Vozalis, M.G.1
Margaritis, K.G.2
-
106
-
-
84883983218
-
New Microsoft Bing Maps Show Streetside Views
-
The Seattle Times, December 2, 2009
-
Chan, S. P. (2009) "New Microsoft Bing Maps Show Streetside Views," The Seattle Times, December 2, 2009, http://seattletimes.nwsource.com/html/microsoftpri0/2010405191_somenewmapandsearchfeaturesformicrosoftbing.html.
-
(2009)
-
-
Chan, S.P.1
-
107
-
-
84883921449
-
Gang of Villagers Chase Away Google Car
-
CNN Staff
-
CNN Staff. (2009) "Gang of Villagers Chase Away Google Car," http://www.cnn.com/2009/WORLD/europe/04/03/google.anger/index.html.
-
(2009)
-
-
-
108
-
-
84884044703
-
Welcome to the Funny Side of Google Street View
-
Corank.com.
-
Corank.com. (2009) "Welcome to the Funny Side of Google Street View," http://streetviewgallery.corank.com/.
-
(2009)
-
-
-
109
-
-
51949117016
-
Extracting Social Networks and Contact Information from Email and the Web
-
First Conference on Email and Anti-Spam (2004)
-
Culotta, A., Bekkerman, R., and McCallum A. (2004) "Extracting Social Networks and Contact Information from Email and the Web," First Conference on Email and Anti-Spam (2004), http://www.cs.umass.edu/~culotta/pubs/culotta04extracting.pdf.
-
(2004)
-
-
Culotta, A.1
Bekkerman, R.2
McCallum, A.3
-
110
-
-
84884015059
-
Google to Fund 'Video Street View' for Central London
-
The Register (Apr. 1, 2009)
-
Ghia, A. (2009) "Google to Fund 'Video Street View' for Central London," The Register (Apr. 1, 2009), http://www.theregister.co.uk/2009/04/01/watch_out_london/.
-
(2009)
-
-
Ghia, A.1
-
111
-
-
84884098105
-
Microsoft Bing Now Features Updated Maps, Twitter Feed
-
eWeek.com (Dec. 2, 2009)
-
Kolakowski, N. (2009) "Microsoft Bing Now Features Updated Maps, Twitter Feed," eWeek.com (Dec. 2, 2009), http://www.eweek.com/c/a/Windows/Microsoft-Bing-Now-Features-Updated-Maps-Twitter-Feed-592395/.
-
(2009)
-
-
Kolakowski, N.1
-
112
-
-
84883908191
-
Amazon A9 Takes It to the Streets
-
CNet News (Aug. 15, 2005)
-
Mills, E. (2005) "Amazon A9 Takes It to the Streets," CNet News (Aug. 15, 2005), http://news.cnet.com/2100-1032_3-5833916.html.
-
(2005)
-
-
Mills, E.1
-
113
-
-
84884094012
-
Even If God Isn't Watching You, Google Is
-
TimesOnline, March 27, 2009
-
Skinner, F. (2009) "Even If God Isn't Watching You, Google Is," TimesOnline, March 27, 2009, http://www.timesonline.co.uk/tol/comment/columnists/frank_skinner/article5982700.ece.
-
(2009)
-
-
Skinner, F.1
-
114
-
-
77955908704
-
Using Context to Recognize People in Consumer Images
-
IPSJ Transactions on Computer Vision and Applications
-
Gallagher, A. and Chen, T. (2009) "Using Context to Recognize People in Consumer Images," IPSJ Transactions on Computer Vision and Applications, vol. 1, 115-26.
-
(2009)
, vol.1
, pp. 115-126
-
-
Gallagher, A.1
Chen, T.2
-
115
-
-
0031672526
-
Neural Network-based Face Detection
-
no. 1
-
Rowley, H., Baluja, S., and Kanade, T. (1998) "Neural Network-based Face Detection" IEEE-Transactions on Pattern Analysis and Machine Intelligence, IEEE-PAMI, vol. 20, no. 1, 23-38.
-
(1998)
IEEE-Transactions on Pattern Analysis and Machine Intelligence, IEEE-PAMI
, vol.20
, pp. 23-38
-
-
Rowley, H.1
Baluja, S.2
Kanade, T.3
-
116
-
-
51849138720
-
Autotagging Facebook: Social Network Context Improves Photo Annotation
-
Proc. First IEEE Workshop on Internet Vision
-
Stone, Z., Zickler, T., and Darrell, T. (2008) "Autotagging Facebook: Social Network Context Improves Photo Annotation," Proc. First IEEE Workshop on Internet Vision, 2008.
-
(2008)
-
-
Stone, Z.1
Zickler, T.2
Darrell, T.3
-
117
-
-
2142812371
-
Robust Real-Time Face Detection
-
no. 2
-
Viola, P. and Jones, M. J. (2004) "Robust Real-Time Face Detection," International Journal of Computer Vision, vol. 57, no. 2, 137-54.
-
(2004)
International Journal of Computer Vision
, vol.57
, pp. 137-154
-
-
Viola, P.1
Jones, M.J.2
-
118
-
-
1842499650
-
Face Recognition: A Literature Survey
-
no. 4
-
Zhao, W., Chellappa, R., Phillips, P., and Rosenfeld, A. (2003) "Face Recognition: A Literature Survey," Computing Surveys, vol. 35, no. 4, 399-459.
-
(2003)
Computing Surveys
, vol.35
, pp. 399-459
-
-
Zhao, W.1
Chellappa, R.2
Phillips, P.3
Rosenfeld, A.4
-
119
-
-
84884075123
-
Surveillance Cameras Get Smarter: New Devices Can Watch, Interpret What They're Seeing
-
MSNBC.com (Feb. 25, 2007)
-
Associated Press. (2007) "Surveillance Cameras Get Smarter: New Devices Can Watch, Interpret What They're Seeing," MSNBC.com (Feb. 25, 2007), http://www.msnbc.msn.com/id/17330942/.
-
(2007)
-
-
Associated, Press.1
-
120
-
-
85008013399
-
Introduction to the Special Section on Video Surveillance
-
no. 7 (July 2000)
-
Collins, R. T., Lipton, A. J., and Kanade, T. (2000) "Introduction to the Special Section on Video Surveillance," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 22, no. 7 (July 2000), 745-46.
-
(2000)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.22
, pp. 745-746
-
-
Collins, R.T.1
Lipton, A.J.2
Kanade, T.3
-
121
-
-
22944474190
-
Issues in Automated Visual Surveillance
-
Proceedings of VIIth Digital Image Computing: Technique and Applications
-
Dick, A. R. and Brooks, M. J. (2003) "Issues in Automated Visual Surveillance," Proceedings of VIIth Digital Image Computing: Technique and Applications, 195-204.
-
(2003)
, pp. 195-204
-
-
Dick, A.R.1
Brooks, M.J.2
-
122
-
-
38449115280
-
CCTV in London
-
Working Paper No. 6, Center for Criminology and Criminal Justice, University of Hull
-
McCahill, M. and Norris, C. (2002) "CCTV in London," Working Paper No. 6, Center for Criminology and Criminal Justice, University of Hull, http://www.urbaneye.net/results/ue_wp6.pdf.
-
(2002)
-
-
McCahill, M.1
Norris, C.2
-
123
-
-
85013702534
-
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis
-
Butterworth-Heinemann
-
McCue, C. (2007) Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, Butterworth-Heinemann.
-
(2007)
-
-
McCue, C.1
-
124
-
-
18144393075
-
A Video Database of Moving Faces and People
-
no. 5 (May 2005)
-
O'Toole, A. J., Harms, J., Snow, S. L., Hurst, D. R., Pappas, M. R., Ayyad, J. H., and Abdi, H. (2005) "A Video Database of Moving Faces and People," IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, no. 5 (May 2005), 812-16.
-
(2005)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.27
, pp. 812-816
-
-
O'Toole, A.J.1
Harms, J.2
Snow, S.L.3
Hurst, D.R.4
Pappas, M.R.5
Ayyad, J.H.6
Abdi, H.7
-
125
-
-
33751187561
-
The Long Tail
-
Wired (Oct. 2004)
-
Anderson, C. (2004) "The Long Tail," Wired (Oct. 2004), http://www.wired.com/wired/archive/12.10/tail.html.
-
(2004)
-
-
Anderson, C.1
-
126
-
-
84883920992
-
The Long Tail: Chris Anderson's Blog
-
Anderson, C. (2009) The Long Tail: Chris Anderson's Blog, http://longtail.typepad.com/the_long_tail/.
-
(2009)
-
-
Anderson, C.1
-
127
-
-
84883971778
-
The Long Tail of YouTube
-
Change Is Good Blog (July 2006)
-
Bello, S. (2006) "The Long Tail of YouTube," Change Is Good Blog (July 2006), http://changesgood.wordpress.com/2006/07/04/the-long-tail-of-youtube/.
-
(2006)
-
-
Bello, S.1
-
128
-
-
0038589165
-
The Anatomy of a Large-Scale Hypertextual Web Search Engine
-
Comput. Netw.
-
Brin, S. and Page, L. (1998) "The Anatomy of a Large-Scale Hypertextual Web Search Engine," Comput. Netw., 107-17. http://infolab.stanford.edu/~backrub/google.html.
-
(1998)
, pp. 107-117
-
-
Brin, S.1
Page, L.2
-
129
-
-
62549107194
-
Search Engines: Information Retrieval in Practice
-
Addison Wesley
-
Croft, B., Metzler, D., and Strohman, T. (2009) Search Engines: Information Retrieval in Practice, Addison Wesley.
-
(2009)
-
-
Croft, B.1
Metzler, D.2
Strohman, T.3
-
130
-
-
77956627097
-
Query Logs Alone Are Not Enough
-
Query Log Analysis: Social and Technological Challenges, A Workshop at the 16th International World Wide Web Conference
-
Grimes, C., Tang D., and Russell, D. M. (2007) "Query Logs Alone Are Not Enough," Query Log Analysis: Social and Technological Challenges, A Workshop at the 16th International World Wide Web Conference.
-
(2007)
-
-
Grimes, C.1
Tang, D.2
Russell, D.M.3
-
131
-
-
84883925975
-
On the Trail of the Long Tail
-
Yahoo! Search Blog
-
Hoffman, H. (2005) "On the Trail of the Long Tail," Yahoo! Search Blog, http://ysearchblog.com/2005/02/17/on-the-trail-of-the-long-tail/.
-
(2005)
-
-
Hoffman, H.1
-
132
-
-
0003774428
-
How to Lie with Statistics
-
W.W. Norton & Co
-
Huff, D. and Geis, I. (1993) How to Lie with Statistics, W.W. Norton & Co.
-
(1993)
-
-
Huff, D.1
Geis, I.2
-
133
-
-
77957783039
-
Search Evaluation at Google
-
Google Blog (Sept. 15, 2008)
-
Huffman, S. (2008) "Search Evaluation at Google," Google Blog (Sept. 15, 2008), http://googleblog.blogspot.com/2008/09/search-evaluation-at-google.html.
-
(2008)
-
-
Huffman, S.1
-
134
-
-
77957793206
-
Introduction to Google Search Quality
-
Google Blog (May 20, 2008)
-
Manber, U. (2008) "Introduction to Google Search Quality," Google Blog (May 20, 2008), http://googleblog.blogspot.com/2008/05/introduction-to-google-search-quality.html.
-
(2008)
-
-
Manber, U.1
-
135
-
-
84883904931
-
Warning Signs in Experimental Design and Interpretation
-
Norvig.com
-
Norvig, P. (2007) "Warning Signs in Experimental Design and Interpretation," Norvig.com, http://norvig.com/experiment-design.html.
-
(2007)
-
-
Norvig, P.1
-
136
-
-
0038498684
-
How Search Engines Rank Web Pages
-
Search Engine Watch (Mar. 15, 2007)
-
Search Engine Watch (2007) "How Search Engines Rank Web Pages," Search Engine Watch (Mar. 15, 2007), http://searchenginewatch.com/2167961.
-
(2007)
-
-
Search Engine Watch1
-
137
-
-
77957784647
-
Introduction to Google Ranking
-
Google Blog (July 9, 2008)
-
Singhal, A. (2008) "Introduction to Google Ranking," Google Blog (July 9, 2008), http://googleblog.blogspot.com/2008/07/introduction-to-google-ranking.html.
-
(2008)
-
-
Singhal, A.1
-
138
-
-
84883923238
-
Technologies Behind Google Ranking
-
Google Blog (July. 16, 2008)
-
Singhal, A. (2008) "Technologies Behind Google Ranking," Google Blog (July. 16, 2008), http://googleblog.blogspot.com/2008/07/technologies-behind-google-ranking.html.
-
(2008)
-
-
Singhal, A.1
-
139
-
-
50249168236
-
What's Going on in Search Engine Rankings?
-
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications-Workshops (Mar. 25-28, 2008)
-
Yoshida, Y., Ueda, T., Tashiro, T., Hirate, Y., and Yamana, H. (2008) "What's Going on in Search Engine Rankings?" Proceedings of the 22nd International Conference on Advanced Information Networking and Applications-Workshops (Mar. 25-28, 2008).
-
(2008)
-
-
Yoshida, Y.1
Ueda, T.2
Tashiro, T.3
Hirate, Y.4
Yamana, H.5
-
140
-
-
84883995822
-
Tracking LBS Apps on iPhone, Android.
-
All Points Blog. (2009) "Tracking LBS Apps on iPhone, Android." http://apb.directionsmag.com/archives/5457-Tracking-LBS-Apps-on-iPhone,-Android.html.
-
(2009)
-
-
All Points, B.1
-
141
-
-
33745888870
-
Survey on Location Privacy in Pervasive Computing
-
Gorlach, A., Heinemann, A., and Terpstra, W. (2004) "Survey on Location Privacy in Pervasive Computing," Privacy, Security and Trust within the Context of Pervasive Computing, The Kluwer International Series in Engineering and Computer Science.
-
(2004)
-
-
Gorlach, A.1
Heinemann, A.2
Terpstra, W.3
-
142
-
-
84883965514
-
See Where Your Friends Are with Google Latitude
-
Google Blog
-
Gundotra, V. (2009) "See Where Your Friends Are with Google Latitude," Google Blog, http://googleblog.blogspot.com/2009/02/see-where-your-friends-are-with-google.html.
-
(2009)
-
-
Gundotra, V.1
-
143
-
-
82055172031
-
Mobile Phones that Track Your Buddies
-
cNet news (Nov. 14, 2006)
-
Reardon, M. (2006) "Mobile Phones that Track Your Buddies," cNet news (Nov. 14, 2006), http://news.cnet.com/Mobile-phones-that-track-your-buddies/2100-1039_3-6135209.html.
-
(2006)
-
-
Reardon, M.1
-
144
-
-
84884058579
-
Sprint to Offer Loopt Friend-Tracking Service
-
cNet news (July 17, 2007)
-
Reardon, M. (2007) "Sprint to Offer Loopt Friend-Tracking Service," cNet news (July 17, 2007), http://news.cnet.com/8301-10784_3-9745834-7.html.
-
(2007)
-
-
Reardon, M.1
-
145
-
-
84883995927
-
Verizon Wireless Adds Friend-Finding Service
-
cNet news (Mar. 28, 2008)
-
Reardon, M. (2008) "Verizon Wireless Adds Friend-Finding Service," cNet news (Mar. 28, 2008), http://news.cnet.com/8301-10784_3-9905438-7.html.
-
(2008)
-
-
Reardon, M.1
-
146
-
-
84884040388
-
AT&T Launches Family-Tracking Service
-
cNet news (Apr. 15, 2009)
-
Reardon, M. (2009) "AT&T Launches Family-Tracking Service," cNet news (Apr. 15, 2009), http://news.cnet.com/8301-1035_3-10219786-94.html.
-
(2009)
-
-
Reardon, M.1
-
147
-
-
84884118669
-
Yahoo Fire Eagle
-
Yahoo.
-
Yahoo. (2009) "Yahoo Fire Eagle," http://fireeagle.yahoo.net/.
-
(2009)
-
-
-
148
-
-
84865656232
-
Mining Interesting Locations and Travel Sequences from GPS Trajectories
-
Proceedings of the 18th International Conference on World Wide Web, WWW-2009
-
Zheng, Y., Xie, X., and Ma, W. (2009) "Mining Interesting Locations and Travel Sequences from GPS Trajectories," Proceedings of the 18th International Conference on World Wide Web, WWW-2009, 791-800, http://research.microsoft.com/apps/pubs/?id=79440.
-
(2009)
, pp. 791-800
-
-
Zheng, Y.1
Xie, X.2
Ma, W.3
-
149
-
-
33750699962
-
Comparative Experiments on Sentiment Classification for Online Product Reviews
-
Proceedings of the Twenty-First National Conference on Artificial Intelligence (AAAI-06), July 16-20, 2006, Boston, Massachusetts
-
Cui, H., Mittal, V., and Datar, M. (2006) "Comparative Experiments on Sentiment Classification for Online Product Reviews," Proceedings of the Twenty-First National Conference on Artificial Intelligence (AAAI-06), July 16-20, 2006, Boston, Massachusetts.
-
(2006)
-
-
Cui, H.1
Mittal, V.2
Datar, M.3
-
150
-
-
77956209694
-
Sentiment Summarization: Evaluating and Learning User Preferences
-
12th Conference of the European Chapter of the Association for Computational Linguistics (EACL-09)
-
Lerman, K., Blair-Goldensohn, S., and McDonald, R. (2009) "Sentiment Summarization: Evaluating and Learning User Preferences," 12th Conference of the European Chapter of the Association for Computational Linguistics (EACL-09).
-
(2009)
-
-
Lerman, K.1
Blair-goldensohn, S.2
McDonald, R.3
-
151
-
-
84883966856
-
McAfee Inc. Exposes the Psychological Warfare Used by Cybercriminals
-
Manufacturing & Logistics IT.,
-
Manufacturing & Logistics IT. (2007) "McAfee Inc. Exposes the Psychological Warfare Used by Cybercriminals," www.logisticsit.com, http://www.logisticsit.com/absolutenm/templates/article-news.aspx?articleid=3147&zoneid=26.
-
(2007)
-
-
-
152
-
-
48449095896
-
Opinion Mining and Sentiment Analysis
-
Foundations and Trends in Information Retrieval
-
Pang, B. and Lee, L. (2008) "Opinion Mining and Sentiment Analysis," Foundations and Trends in Information Retrieval, vol. 2, 1-135.
-
(2008)
, vol.2
, pp. 1-135
-
-
Pang, B.1
Lee, L.2
-
153
-
-
84883926157
-
Psychological Operations
-
Wikipedia., Wikipedia: The Free Encyclopedia
-
Wikipedia. (2009) "Psychological Operations," Wikipedia: The Free Encyclopedia, http://en.wikipedia.org/wiki/Psychological_operations.
-
(2009)
-
-
-
154
-
-
33745726542
-
Publicly Intimate Online: Iranian Web Logs in Southern California
-
no. 1 (2006)
-
Alexanian, J. (2006) "Publicly Intimate Online: Iranian Web Logs in Southern California," Comparative Studies of South Asia, Africa, and the Middle East vol. 26, no. 1 (2006),134-45.
-
(2006)
Comparative Studies of South Asia, Africa, and the Middle East
, vol.26
, pp. 134-145
-
-
Alexanian, J.1
-
155
-
-
65349182986
-
Selling Our Independence? The Perils of Pentagon Funding for Anthropology
-
no. 5 (Oct. 2008)
-
Lutz, C. (2008) "Selling Our Independence? The Perils of Pentagon Funding for Anthropology," Anthropology Today, vol. 24, no. 5 (Oct. 2008), 1-3, http://www.brown.edu/Administration/International_Affairs/international/documents/LutzReadings4.pdf.
-
(2008)
Anthropology Today
, vol.24
, pp. 1-3
-
-
Lutz, C.1
-
156
-
-
0040366522
-
Tenure Issues in Higher Education
-
no. 1 (Winter)
-
McPherson, M. and Schapiro, M. (1999) "Tenure Issues in Higher Education," The Journal of Economic Perspectives, vol. 13, no. 1 (Winter), 85-98.
-
(1999)
The Journal of Economic Perspectives
, vol.13
, pp. 85-98
-
-
McPherson, M.1
Schapiro, M.2
-
157
-
-
27344450109
-
Applying Authorship Analysis to Extremist-Group Web Forum Messages
-
no. 5 (Sep. 2005)
-
Abbasi, A. and Chen, H. (2005) "Applying Authorship Analysis to Extremist-Group Web Forum Messages," IEEE Intelligent Systems, vol. 20, no. 5 (Sep. 2005), 67-75.
-
(2005)
IEEE Intelligent Systems
, vol.20
, pp. 67-75
-
-
Abbasi, A.1
Chen, H.2
-
158
-
-
34547998923
-
The Rendezvous Algorithm: Multiclass Semi-supervised Learning with Markov Random Walks
-
ACM, New York
-
Azran, A. (2007) "The Rendezvous Algorithm: Multiclass Semi-supervised Learning with Markov Random Walks," Proceedings of the 24th International Conference on Machine Learning (Corvalis, Oregon, June 20-24, 2007). Z. Ghahramani, Ed. ICML '07, vol. 227, ACM, New York, 49-56.
-
(2007)
Proceedings of the 24th International Conference on Machine Learning (Corvalis, Oregon, June 20-24, 2007). Z. Ghahramani, Ed. ICML '07
, vol.227
, pp. 49-56
-
-
Azran, A.1
-
159
-
-
57349151435
-
Video Suggestion and Discovery for YouTube: Taking Random Walks through the View Graph
-
Proceedings of the 17th International Conference on World Wide Web, WWW '08. (Beijing, China, April 21-25, 2008)
-
Baluja, S., Seth, R., Sivakumar, D., Jing, Y., Yagnik, J., Kumar, S., Ravichandran, D., and Aly, M. (2008) "Video Suggestion and Discovery for YouTube: Taking Random Walks through the View Graph," Proceedings of the 17th International Conference on World Wide Web, WWW '08. (Beijing, China, April 21-25, 2008).
-
(2008)
-
-
Baluja, S.1
Seth, R.2
Sivakumar, D.3
Jing, Y.4
Yagnik, J.5
Kumar, S.6
Ravichandran, D.7
Aly, M.8
-
160
-
-
0004076963
-
Introduction to Informetrics
-
Elsevier
-
Egghe, L. and Rousseau, R. (1990) Introduction to Informetrics, Elsevier.
-
(1990)
-
-
Egghe, L.1
Rousseau, R.2
-
161
-
-
39749118184
-
Al Qaida: Terrorist Selection and Recruitment
-
RAND National Security Research Division and McGraw-Hill Homeland Security Handbook, Kamien, D. (ed). McGraw-Hill
-
Gerwehr, S. and Daly, S. (2005) "Al Qaida: Terrorist Selection and Recruitment," RAND National Security Research Division and McGraw-Hill Homeland Security Handbook, Kamien, D. (ed). McGraw-Hill, http://www.rand.org/pubs/reprints/2006/RAND_RP1214.pdf, http://www.rand.org/pubs/authors/g/gerwehr_scott.html.
-
(2005)
-
-
Gerwehr, S.1
Daly, S.2
-
162
-
-
0031617713
-
Inferring Web Communities from Link Topology
-
Proceedings of the 9th ACM Conference on Hypertext and Hypermedia
-
Gibson, D., Kleinberg, J., and Raghavan, P. (1998) "Inferring Web Communities from Link Topology," Proceedings of the 9th ACM Conference on Hypertext and Hypermedia.
-
(1998)
-
-
Gibson, D.1
Kleinberg, J.2
Raghavan, P.3
-
163
-
-
0001063068
-
College Libraries and Chemical Education
-
Science 66
-
Gross, P. L. K. and Gross, E. M. (1927) "College Libraries and Chemical Education," Science 66, 385-89.
-
(1927)
, pp. 385-389
-
-
Gross, P.L.K.1
Gross, E.M.2
-
164
-
-
84865638229
-
Two Birds with One Stone: A Graph-based Framework for Disambiguating and Tagging People Names in Web Search
-
Proceedings of the 18th International Conference on World Wide Web, WWW-2009
-
Jiang, L., Wang, J., An, N., Wang, S., Zhan, J., and Li, L. (2009) "Two Birds with One Stone: A Graph-based Framework for Disambiguating and Tagging People Names in Web Search," Proceedings of the 18th International Conference on World Wide Web, WWW-2009, 1201-2.
-
(2009)
, pp. 1201-1202
-
-
Jiang, L.1
Wang, J.2
An, N.3
Wang, S.4
Zhan, J.5
Li, L.6
-
165
-
-
0032256758
-
Authoritative Sources in a Hyperlinked Environment
-
Proc. 9th ACM-SIAM Symposium on Discrete Algorithms
-
Kleinberg, J. (1998) "Authoritative Sources in a Hyperlinked Environment," Proc. 9th ACM-SIAM Symposium on Discrete Algorithms.
-
(1998)
-
-
Kleinberg, J.1
-
166
-
-
0000116217
-
The Frequency Distribution of Scientific Productivity
-
Journal of the Washington Academy of Sciences, vol. 16
-
Lotka, A. J. (1926) "The Frequency Distribution of Scientific Productivity," Journal of the Washington Academy of Sciences, vol. 16, 317-23.
-
(1926)
, pp. 317-323
-
-
Lotka, A.J.1
-
167
-
-
75349105276
-
The Enemy Within: Where Are the Islamist/Jihadist Web Sites Hosted, and What Can be Done About It?
-
MEMRI., The Middle East Media Research Institute
-
MEMRI. (2007) "The Enemy Within: Where Are the Islamist/Jihadist Web Sites Hosted, and What Can be Done About It?" The Middle East Media Research Institute, http://memri.org/bin/latestnews.cgi?ID=IA37407.
-
(2007)
-
-
-
168
-
-
0036343636
-
The J-Shaped Distribution of Citedness
-
no. 4
-
Nicolaisen, J. (2002) "The J-Shaped Distribution of Citedness," Journal of Documentation, vol. 58, no. 4, 383-95.
-
(2002)
Journal of Documentation
, vol.58
, pp. 383-395
-
-
Nicolaisen, J.1
-
169
-
-
34547379451
-
Internet-Savvy U.S. and Middle Eastern Extremist Groups.
-
no. 2 (2007)
-
Reid, E. and Chen, H. (2007) "Internet-Savvy U.S. and Middle Eastern Extremist Groups." Mobilization: An International Quarterly, vol. 12, no. 2 (2007), 177-92.
-
(2007)
Mobilization: An International Quarterly
, vol.12
, pp. 177-192
-
-
Reid, E.1
Chen, H.2
-
170
-
-
33744955193
-
Semi-Supervised Learning with Graphs
-
Zhu, X. (2005) "Semi-Supervised Learning with Graphs," Ph.D. thesis, Carnegie Mellon University, CMU-LTI-05-192.
-
(2005)
-
-
Zhu, X.1
-
171
-
-
84883979103
-
Why Medical Schools Provide Islamic Extremists with Fertile Recruiting Grounds
-
The Times and TimesOnline (July 4, 2007)
-
Binyon, M. (2007) "Why Medical Schools Provide Islamic Extremists with Fertile Recruiting Grounds," The Times and TimesOnline (July 4, 2007), http://www.timesonline.co.uk/tol/news/uk/crime/article2023018.ece.
-
(2007)
-
-
Binyon, M.1
-
172
-
-
84883912641
-
The United States Identifies 42 Foreign Terrorist Organizations
-
America.gov., America.gov (Apr. 30, 2008)
-
America.gov. (2008) "The United States Identifies 42 Foreign Terrorist Organizations," America.gov (Apr. 30, 2008), http://www.america.gov/st/peacesec-english/2008/April/20080429115651dmslahrellek0.9584772.html.
-
(2008)
-
-
-
173
-
-
84884093323
-
Google Rejects DOJ Bid for Search Info, Rivals Including Microsoft and Yahoo Have Already Complied with the Demand
-
Computerworld.com (Feb. 18, 2006)
-
Auchard, E. (2006) "Google Rejects DOJ Bid for Search Info, Rivals Including Microsoft and Yahoo Have Already Complied with the Demand," Computerworld.com (Feb. 18, 2006), http://www.computerworld.com/printthis/2006/0,4814,108843,00.html.
-
(2006)
-
-
Auchard, E.1
-
174
-
-
77953978515
-
The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America
-
New York: Doubleday
-
Bamford, J. (2008) The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America, New York: Doubleday.
-
(2008)
-
-
Bamford, J.1
-
175
-
-
70349811921
-
Chasing $1,000,000: How We Won the Netflix Progress Prize
-
no. 2
-
Bell, R., Koren, Y., and Volinsky, C. (2007) "Chasing $1,000,000: How We Won the Netflix Progress Prize," ASA Statistical and Computing Graphics Newsletter, vol. 18, no. 2.
-
(2007)
ASA Statistical and Computing Graphics Newsletter
, vol.18
-
-
Bell, R.1
Koren, Y.2
Volinsky, C.3
-
176
-
-
84883939940
-
CorpWatch: Holding Corporations Accountable
-
CorpWatch., Web site
-
CorpWatch. (2009) CorpWatch: Holding Corporations Accountable, Web site, http://www.corpwatch.org/.
-
(2009)
-
-
-
177
-
-
84883988279
-
'GMA' Gets Answers: Some Credit Card Companies Financially Profiling Customers
-
abcNews.com (Jan. 28, 2008)
-
Cuomo, C., Shaylor, J., McGuirt, M., Francescani, C. (2009) " 'GMA' Gets Answers: Some Credit Card Companies Financially Profiling Customers," abcNews.com (Jan. 28, 2008), http://abcnews.go.com/GMA/GetsAnswers/story?id=6747461&page=1.
-
(2009)
-
-
Cuomo, C.1
Shaylor, J.2
McGuirt, M.3
Francescani, C.4
-
178
-
-
84883922984
-
Terror Database Has Quadrupled in Four Years
-
The Washington Post, March 25, 2007
-
DeYoung, K. (2007) "Terror Database Has Quadrupled in Four Years" The Washington Post, March 25, 2007, http://www.washingtonpost.com/wp-dyn/content/article/2007/03/24/AR2007032400944_pf.html.
-
(2007)
-
-
DeYoung, K.1
-
179
-
-
84883972527
-
Terrorist Watch List Hits 1 Million
-
USA Today (Mar. 10, 2009)
-
Eisler, P. (2009) "Terrorist Watch List Hits 1 Million," USA Today (Mar. 10, 2009), http://www.usatoday.com/news/washington/2009-03-10-watchlist_N.htm.
-
(2009)
-
-
Eisler, P.1
-
180
-
-
84884071858
-
Callers Can't Hide
-
Forbes (May 11, 2006)
-
Frommer, D. (2006) "Callers Can't Hide," Forbes (May 11, 2006), http://www.forbes.com/2006/05/11/wireless-nsa-voip_cx_df_0511security.html?boxes=custom.
-
(2006)
-
-
Frommer, D.1
-
181
-
-
84884028382
-
AT&T Slapped in NSA Suit
-
Forbes (May 17, 2006)
-
Frommer, D. (2006) "AT&T Slapped in NSA Suit," Forbes (May 17, 2006), http://www.forbes.com/2006/05/17/nsa-wiretap-att_cx_df_0517nsa.html.
-
(2006)
-
-
Frommer, D.1
-
182
-
-
84883977107
-
Paper Pulls Back on Spy Story
-
Forbes (June 30, 2006)
-
Frommer, D. (2006) "Paper Pulls Back on Spy Story," Forbes (June 30, 2006), http://www.forbes.com/2006/06/30/wiretap-nsa-phone_cx_df_0630nsa.html.
-
(2006)
-
-
Frommer, D.1
-
183
-
-
84884073271
-
Judge Hangs Up on NSA Spy Program
-
Forbes (Aug. 17, 2006)
-
Frommer, D. (2006) "Judge Hangs Up on NSA Spy Program," Forbes (Aug. 17, 2006), http://www.forbes.com/2006/08/17/NSA-wiretap-spying_cx_df_0817nsa.html?boxes=custom.
-
(2006)
-
-
Frommer, D.1
-
184
-
-
84883947932
-
Exclusive: Intel Outsourcing at Heart of Gonzales Controversy
-
The Spy Who Billed Me: Outsourcing the War on Terror (July 30, 2007)
-
Hillhouse, R. J. (2007) "Exclusive: Intel Outsourcing at Heart of Gonzales Controversy," The Spy Who Billed Me: Outsourcing the War on Terror (July 30, 2007), http://www.thespywhobilledme.com/the_spy_who_billed_me/2007/07/corporate-spyin.html.
-
(2007)
-
-
Hillhouse, R.J.1
-
185
-
-
84884049210
-
Did the NSA Break the Law?
-
Forbes (May 11, 2006)
-
Holzer, J. (2006) "Did the NSA Break the Law?" Forbes (May 11, 2006), http://www.forbes.com/2006/05/11/nsa-wiretap-bush_cx_jh_0511NSA.html?boxes=custom.
-
(2006)
-
-
Holzer, J.1
-
186
-
-
84924270699
-
Terrorist Identities Datamart Environment
-
National Counterterrorism Center. (2009) "Terrorist Identities Datamart Environment," www.nctc.gov. http://www.nctc.gov/docs/Tide_Fact_Sheet.pdf.
-
(2009)
-
-
National Counterterrorism, Center.1
-
187
-
-
36849028128
-
Applying Collaborative Filtering Techniques to Movie Search for Better Ranking and Browsing
-
Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
Park, S. and Pennock, D. (2007) "Applying Collaborative Filtering Techniques to Movie Search for Better Ranking and Browsing," Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, http://research.yahoo.com/node/261.
-
(2007)
-
-
Park, S.1
Pennock, D.2
-
188
-
-
84883970041
-
Verizon NSA Suit Could Add Risk
-
Forbes (May 15, 2006)
-
Roney, M. (2006) "Verizon NSA Suit Could Add Risk," Forbes (May 15, 2006), http://www.forbes.com/2006/05/15/verizon-communications-0515markets07.html.
-
(2006)
-
-
Roney, M.1
-
189
-
-
84883950322
-
Judge Orders YouTube to Give All User Histories to Viacom
-
Wired-Blog
-
Singel, R. (2008) "Judge Orders YouTube to Give All User Histories to Viacom," Wired-Blog, http://blog.wired.com/27bstroke6/2008/07/judge-orders-yo.html.
-
(2008)
-
-
Singel, R.1
-
190
-
-
84883982017
-
FBI Mishandles Terror Watch List
-
Wired-Blog
-
Singel, R. (2009) "FBI Mishandles Terror Watch List," Wired-Blog, http://www.wired.com/threatlevel/2009/05/fbi-gets-f-in-handling-terror-watch-list-ig-finds/.
-
(2009)
-
-
Singel, R.1
-
191
-
-
77957952413
-
Newly Declassified Files Detail Massive FBI Data-Mining Project
-
Wired-Blog
-
Singel, R. (2009) "Newly Declassified Files Detail Massive FBI Data-Mining Project," Wired-Blog, http://www.wired.com/threatlevel/2009/09/fbi-nsac/.
-
(2009)
-
-
Singel, R.1
-
192
-
-
84884016274
-
Flights of Fancy; Many Muslim Youth Espouse Jihad as a Fad
-
Globe and Mail, June 12, 2006
-
Stern, J. (2006) "Flights of Fancy; Many Muslim Youth Espouse Jihad as a Fad," Globe and Mail, June 12, 2006, http://belfercenter.ksg.harvard.edu/publication/1562/flights_of_fancy_many_muslim_youth_espouse_jihad_as_a_fad.html.
-
(2006)
-
-
Stern, J.1
-
193
-
-
84884060379
-
AmEx Rates Credit Risk by Where You Live, Shop
-
MSNBC.com (Oct. 7, 2008)
-
Stuckey, M. (2008) "AmEx Rates Credit Risk by Where You Live, Shop," MSNBC.com (Oct. 7, 2008), http://www.msnbc.msn.com/id/27055285/.
-
(2008)
-
-
Stuckey, M.1
-
194
-
-
84884056380
-
Judge Orders TorrentSpy to Hand Over User Data
-
Techspot (June 11, 2007)
-
Vilches, J. (2007) "Judge Orders TorrentSpy to Hand Over User Data," Techspot (June 11, 2007), http://www.techspot.com/news/25642-Judge-orders-TorrentSpy-to-handover-user-data.html.
-
(2007)
-
-
Vilches, J.1
-
195
-
-
84884034320
-
Contractors Spy Dollars in NSA Outsourcing
-
Washington Technology (June 16, 2000)
-
Wakeman, N. (2000) "Contractors Spy Dollars in NSA Outsourcing," Washington Technology (June 16, 2000), http://washingtontechnology.com/articles/2000/06/16/contractors-spy-dollars-in-nsa-outsourcing.aspx.
-
(2000)
-
-
Wakeman, N.1
-
196
-
-
84884028353
-
U.S. Counterterror Agency Lacks 'Google-like' Search
-
Reuters (Jan. 20, 2010)
-
Zabarenko, D. (2010) "U.S. Counterterror Agency Lacks 'Google-like' Search," Reuters (Jan. 20, 2010), http://www.reuters.com/article/idUSTRE60J5FA20100120.
-
(2010)
-
-
Zabarenko, D.1
-
197
-
-
57349112634
-
User 4XXXXX9: Anonymizing Query Logs
-
Query Log Analysis: Social and Technological Challenges: A Workshop at the 16th International World Wide Web Conference
-
Adar, E. (2007) "User 4XXXXX9: Anonymizing Query Logs," Query Log Analysis: Social and Technological Challenges: A Workshop at the 16th International World Wide Web Conference.
-
(2007)
-
-
Adar, E.1
-
198
-
-
84884019673
-
Towards Privacy Preserving Query Log Publishing
-
Query Log Analysis: Social and Technological Challenges: A Workshop at the 16th International World Wide Web Conference
-
Xiong, L. and Agichtein, E. (2007) "Towards Privacy Preserving Query Log Publishing," Query Log Analysis: Social and Technological Challenges: A Workshop at the 16th International World Wide Web Conference.
-
(2007)
-
-
Xiong, L.1
Agichtein, E.2
|