|
|
|
|
Wang, De
Google Inc.
Mountain View, California
|
|
|
|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 10
reviews
|
|
|
|
|
|
|
|
Data stewardship: an actionable guide to effective data management and data governance Plotkin D., Morgan Kaufmann Publishers Inc., San Francisco, CA, 2014. 248 pp. Type: Book
Almost every aspect of data stewardship, from the definition to implementation of the whole concept, is described in this book. It is an excellent guide for any organization that involves user data management and protection....
|
Jun 3 2015 |
|
|
|
|
|
|
Spam nation: the inside story of organized cybercrime--from global epidemic to your front door Krebs B., Sourcebooks, Incorporated, Naperville, IL, 2014. 272 pp. Type: Book (978-1-402295-61-4)
In this book, Brian Krebs, a famous journalist and investigative reporter known for his coverage of profit-seeking cyber criminals, covers the spam business and the spammers behind it, explaining the details of how spam businesses earn...
|
Apr 10 2015 |
|
|
|
|
|
|
Secure and efficient anonymization of distributed confidential databases Herranz J., Nin J. International Journal of Information Security 13(6): 497-512, 2014. Type: Article
Preserving user data privacy while providing utility at the same time requires good system and protocol design and implementation in practice. This paper targets the anonymization of user data from distributed database systems belongin...
|
Feb 17 2015 |
|
|
|
|
|
|
Risks and myths of cloud computing and cloud storage Neumann P. Communications of the ACM 57(10): 25-27, 2014. Type: Article
This article focuses on risks in cloud computing when designing, selecting, and configuring cloud services. Cloud computing has brought many benefits, such as low cost and simple management. However, it also comes with many risks, incl...
|
Dec 4 2014 |
|
|
|
|
|
|
Big data architecture evolution: 2014 and beyond Mohammad A., Mcheick H., Grant E. DIVANet 2014 (Proceedings of the 4th ACM International Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, Montreal, QC, Canada, Sep 21-26, 2014) 139-144, 2014. Type: Proceedings, Reviews: (1 of 2)
Big data architecture is rapidly evolving due to the recent dramatic growth of information. People search for useful information and at the same time generate more information. Efficiently retrieving information and effectively managin...
|
Nov 12 2014 |
|
|
|
|
|
|
Security, cybercrime, and scale Herley C. Communications of the ACM 57(9): 64-71, 2014. Type: Article
This article analyzes the traditional threat model for cybersecurity and proposes a new model that considers scalability and financial motivation. In the new threat model, the author splits cybercrime into two categories: financial and...
|
Sep 30 2014 |
|
|
|
|
|
|
Survey on mobile social networking in proximity (MSNP): approaches, challenges and architecture Wang Y., Vasilakos A., Jin Q., Ma J. Wireless Networks 20(6): 1295-1311, 2014. Type: Article
Mobile social networking in proximity (MSNP), also called local social networks and proximity mobile social networks (PMSNs), describes the use of Bluetooth, Wi-Fi Direct, and/or peer-to-peer (P2P) Wi-Fi enabled mobile devices to allow...
|
Sep 25 2014 |
|
|
|
|
|
|
Understanding SMS spam in a large cellular network Jiang N., Jin Y., Skudlark A., Zhang Z. ACM SIGMETRICS Performance Evaluation Review 41(1): 381-382, 2013. Type: Article
Jiang et al. conducted a good study of SMS spam in a large cellular network in the US. They collected a large set of SMS spam through user-generated spam reports, which are more reliable and cleaner compared with other sources. After t...
|
Sep 24 2014 |
|
|
|
|
|
|
Russian web spam evolution: yandex experience Pevtsov S., Pevtsov S., Volkov S., Volkov S. Proceedings of the 22nd International Conference on World Wide Web (Proceedings of the 22nd International World Wide Web Conference, Rio de Janeiro, Brazil, May 13-17, 2013) Comite Gestor da Internet no Brazil, 1137-1140, 2013. Type: Proceedings
“Web spam is defined as web pages that are created to manipulate search engines and deceive web users” [1]. The evolution of Russian web spam is the topic of this paper. The authors introduce detection approaches in...
|
Sep 3 2014 |
|
|
|
|
|
|
A regularization approach to learning task relationships in multitask learning Zhang Y., Yeung D. ACM Transactions on Knowledge Discovery from Data 8(3): 1-31, 2013. Type: Article
Multitask learning is very popular in many domains and has been applied in numerous applications. This paper proposes a novel regularization approach, multitask relationship learning (MTRL), to learn task relationships in multitask lea...
|
Jul 1 2014 |
|
|
|
|
|
|
|
|
|
|
|