Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
Who is Creating Malware Repositories on GitHub and Why?
WWW '24: Companion Proceedings of the ACM Web Conference 2024Pages 955–958https://doi.org/10.1145/3589335.3651582Recent studies have found thousands of malware source code repositories on GitHub. For the first time, we propose to understand the origins and motivations behind the creation of such malware repositories. For that, we collect and profile the authors of ...
- posterJune 2023
Towards Modeling User Behavior in Multi-access Edge Computing
EICS '23 Companion: Companion Proceedings of the 2023 ACM SIGCHI Symposium on Engineering Interactive Computing SystemsPages 85–87https://doi.org/10.1145/3596454.3597193Multi-access Edge Computing moves computation resources closer to the user and is a core component of future mobile networks. To ensure performance, applications must migrate through the network for optimal component deployment. Simulations come in ...
- research-articleJanuary 2023
Gamers' Reaction to the Use of NFT in AAA Video Games
Procedia Computer Science (PROCS), Volume 219, Issue CPages 606–613https://doi.org/10.1016/j.procs.2023.01.329AbstractThe use of non-fungible tokens (NFTs) in AAA games is a very controversial topic, which leads to negative reactions from the gamer community. The objective of this article is to relate some of these cases that presented visibility in the press and ...
- research-articleApril 2020
User's Role in Platform Infrastructuralization: WeChat as an Exemplar
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing SystemsPages 1–13https://doi.org/10.1145/3313831.3376201Recent years have witnessed the rise of platforms such as Facebook and Google. Gigantic in scope and becoming omnipresent, these platforms are acquiring qualities of infrastructure, which is large-scale connected systems that support people's activities ...
- surveyFebruary 2020
Interactive Clustering: A Comprehensive Review
ACM Computing Surveys (CSUR), Volume 53, Issue 1Article No.: 1, Pages 1–39https://doi.org/10.1145/3340960In this survey, 105 papers related to interactive clustering were reviewed according to seven perspectives: (1) on what level is the interaction happening, (2) which interactive operations are involved, (3) how user feedback is incorporated, (4) how ...
-
- research-articleDecember 2019
Adaptive recommendation technology for remote sensing information based on behavior analysis
AIIPCC '19: Proceedings of the International Conference on Artificial Intelligence, Information Processing and Cloud ComputingArticle No.: 50, Pages 1–5https://doi.org/10.1145/3371425.3371457In view of the changing interests of users of remote sensing information, this paper proposes a self-adaptive recommendation technology for remote sensing information based on behavior analysis. Through real-time collection and feedback of user's ...
- research-articleDecember 2019
Sparsity‐based MIMO interference suppression technique in the presence of imperfect channel state information
IET Communications (CMU2), Volume 13, Issue 19Pages 3201–3206https://doi.org/10.1049/iet-com.2019.0420In this study, sparsity‐based precoding schemes have been suggested to suppress the interference and improve the energy efficiency of a massive multiple‐input multiple‐output (MIMO) system when imperfect channel state information is available. To this ...
- research-articleDecember 2019
Relay selection algorithm based on social network combined with Q‐learning for vehicle D2D communication
IET Communications (CMU2), Volume 13, Issue 20Pages 3582–3587https://doi.org/10.1049/iet-com.2019.0419A relay selection algorithm was proposed to improve a communication rate of D2D (device‐to‐device) users in‐vehicle networking communication systems based on social network combined with Q‐learning. The scheme was divided into two steps. Firstly, a social ...
- research-articleMay 2019
Toward usability problem identification based on user emotions derived from facial expressions
SEmotion '19: Proceedings of the 4th International Workshop on Emotion Awareness in Software EngineeringPages 1–7https://doi.org/10.1109/SEmotion.2019.00008Tracking down usability problems poses a challenge for developers since users rarely report explicit feedback without being asked for it. Hence, implicit feedback represents a valuable information source, in particular for rapid development processes ...
- research-articleApril 2019
Information Psychological Theory of the Spiritual Development of a Personality in the Digital Culture Era (to the 95th anniversary of the birth of Yu.S. Zubov)
Scientific and Technical Information Processing (SPSTIP), Volume 46, Issue 2Pages 84–89https://doi.org/10.3103/S0147688219020072Abstract—This paper substantiates the prognostic role and heuristic value of the information-psychological theory of the development of the spiritual personality, which was worked out by Yu.S. Zubov in the late 1970s for the information branch of the ...
- research-articleJanuary 2019
GDPR principles in Data protection encourage pseudonymization through most popular and full-personalized devices - mobile phones
Procedia Computer Science (PROCS), Volume 151, Issue CPages 303–312https://doi.org/10.1016/j.procs.2019.04.043AbstractThe core concept of European reform of the law on the protection of personal data, implemented in EU General Data Protection Regulation (GDPR) – European Parliament and Council Regulation No 2016/679 becoming enforceable on 25th May 2018. GDPR as ...
- short-paperJuly 2018
User Modelling in Exergames for Frail Older Adults
UMAP '18: Adjunct Publication of the 26th Conference on User Modeling, Adaptation and PersonalizationPages 83–86https://doi.org/10.1145/3213586.3226199Advances in technology and virtual reality have put the focus on exergames aimed at the elderly as complementary tools for rehabilitation, due to the beneficial aspects for motor learning they provide. This paper presents a research in progress of an ...
- abstractMarch 2018
The Use of Ethnography to Identify and Address Ethical, Legal, and Societal (ELS) Issues
HRI '18: Companion of the 2018 ACM/IEEE International Conference on Human-Robot InteractionPages 393–394https://doi.org/10.1145/3173386.3173560As robotic technologies rapidly enter our everyday lives, we are compelled to consider the ethical, legal, and societal (ELS) challenges that arise in connection to these changes. In this workshop, we will present a novel methodological approach to HRI ...
- articleMarch 2018
Fragment Method of Restoring the Operation of Digital Systems with the Structure of a Minimal Quasicomplete Graph with Two Paths between Two Users
Automation and Remote Control (ARCO), Volume 79, Issue 3Pages 451–462https://doi.org/10.1134/S0005117918030050The developed approach to the fragment method of restoring the operation of digital systems (DS) structured as a minimal quasicomplete graph with two paths between two users is to alternately restore individual DS fragments. The analyzed DS fragment ...
- research-articleNovember 2017
Research on User Adoption Model and Empirical Study of Cloud Computing Service Based on Structural Equation
ICCIS 2017: Proceedings of the 2017 2nd International Conference on Communication and Information SystemsPages 345–349https://doi.org/10.1145/3158233.3159338The rapid development of cloud computing not only improves the efficiency of users, but also reduces the cost. The factors that influence user adoption of cloud computing include security, reliability, perceived ease of use, perceived usefulness, task, ...
- rfcJuly 2017
RFC 8199: YANG Module Classification
The YANG data modeling language is currently being considered for a wide variety of applications throughout the networking industry at large. Many standards development organizations (SDOs), open-source software projects, vendors, and users are using YANG ...
- short-paperOctober 2016
To See or Not to See: The Effect of Object Recognition on Users' Trust in "Automated Vehicles"
NordiCHI '16: Proceedings of the 9th Nordic Conference on Human-Computer InteractionArticle No.: 42, Pages 1–4https://doi.org/10.1145/2971485.2971551While automated vehicle technology progresses, potentially leading to a safer, more efficient traffic environment, many challenges remain within the area of human factors, such as user trust in Automated Driving (AD) vehicle systems. The authors ...
- posterSeptember 2016
Assessing Conceptions of the Youth User in UX Design
SIGDOC '16: Proceedings of the 34th ACM International Conference on the Design of CommunicationArticle No.: 55, Pages 1–4https://doi.org/10.1145/2987592.2987651This proposal describes a preliminary outline of a current work-in-progress, exploring the concept of the youth user in the field of user experience design and the perception of the youth user and associated application of the concept among user ...
- research-articleJuly 2016
The Seasonality Of Paid Search Effectiveness From A Long Running Field Test
EC '16: Proceedings of the 2016 ACM Conference on Economics and ComputationPages 515–530https://doi.org/10.1145/2940716.2940717Paid Search, also known as Search Engine Marketing (SEM), has been the largest channel in online advertising by revenue. Yet its causal effectiveness has been difficult to measure. At eBay marketplace we have developed a hybrid Geo+User experiment ...
- short-paperJuly 2016
Polarized User and Topic Tracking in Twitter
SIGIR '16: Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information RetrievalPages 945–948https://doi.org/10.1145/2911451.2914716Digital traces of conversations in micro-blogging platforms and OSNs provide information about user opinion with a high degree of resolution. These information sources can be exploited to understand and monitor collective behaviours. In this work, we ...