Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Liu, Wenyin Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 3 of 3 reviews    
  Dual graph regularized NMF model for social event detection from Flickr data
Yang Z., Li Q., Liu W., Ma Y., Cheng M. World Wide Web 20(5): 995-1015, 2017.  Type: Article

Over time, Flickr has become a very large photo and video repository, claiming more than 13 billion photos available onsite. It sounds logical that many people are beginning to consider it as a treasure trove to explore human society. ...
...
Nov 7 2017  
  Smartening the crowds: computational techniques for improving human verification to fight phishing scams
Liu G., Xiang G., Pendleton B., Hong J., Liu W.  SOUPS 2011 (Proceedings of the 7th Symposium on Usable Privacy and Security, Pittsburgh, PA, Jul 20-22, 2011) 1-13, 2011.  Type: Proceedings

A good phishing site should resemble the target site as much as possible, and it should hide the differences with the target site, at least to the unsuspecting user. This paper leverages this observation to cluster similar suspected ph...
...
Feb 9 2012  
  Advances in Web-based learning -- ICWL 2006: 5th International Conference, Penang, Malaysia, July 19-21, 2006, Revised Papers (Lecture Notes in Computer Science)
Liu W., Li Q., Lau R., Springer-Verlag New York, Inc., Secaucus, NJ, 2006.  Type: Book (9783540490272)

The Fifth International Conference on Web-based Learning was held in Malaysia in July 2006. This book includes 32 revised papers presented at that conference. The volume is intended to present different applications of Web-based learni...
...
Jun 22 2007  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy