Search Results - "Shaozhi Ye"
-
1
Crawling Online Social Graphs
Published in 2010 12th International Asia-Pacific Web Conference (01-04-2010)“…Extensive research has been conducted on top of online social networks (OSNs), while little attention has been paid to the data collection process. Due to the…”
Get full text
Conference Proceeding -
2
Error restricted fast MAP decoding of VLC
Published in IEEE communications letters (01-10-2005)“…Joint source channel techniques based on Variable-Length Coding (VLC) have been widely used. One of the most famous VLC decoders is optimal Maximum A…”
Get full text
Journal Article -
3
Understanding current IPv6 performance: a measurement study
Published in 10th IEEE Symposium on Computers and Communications (ISCC'05) (2005)“…Much work has been done on IPv6 standards and testbeds deployment. However, little is known about the performance of the real IPv6 Internet, especially from…”
Get full text
Conference Proceeding -
4
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks
Published in NOMS 2008 - 2008 IEEE Network Operations and Management Symposium (01-04-2008)“…System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to…”
Get full text
Conference Proceeding -
5
Noise Injection for Search Privacy Protection
Published in 2009 International Conference on Computational Science and Engineering (01-08-2009)“…To protect user privacy in the search engine context, most current approaches, such as private information retrieval and privacy preserving data mining,…”
Get full text
Conference Proceeding -
6
Estimating the Size of Online Social Networks
Published in 2010 IEEE Second International Conference on Social Computing (01-08-2010)“…The huge size of online social networks (OSNs) makes it prohibitively expensive to precisely measure any properties which require the knowledge of the entire…”
Get full text
Conference Proceeding -
7
Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics
Published in 2011 International Conference on Advances in Social Networks Analysis and Mining (01-07-2011)“…Social informatics is the core of Facebook's business and is its most valuable asset which consists of the social graph and the private data of over 500…”
Get full text
Conference Proceeding -
8
Web Site Recommendation Using HTTP Traffic
Published in Seventh IEEE International Conference on Data Mining (ICDM 2007) (01-10-2007)“…Collaborative Filtering (CF) is widely used in web recommender systems, while most existing CF applications focus on transactions or page views within a single…”
Get full text
Conference Proceeding -
9
Online social network measurements and search privacy protection
Published 01-01-2010“…This dissertation investigates the following issues within the context of online social networks (OSNs). (1) How to collect data from OSNs; (2) How to estimate…”
Get full text
Dissertation -
10
A systematic study on parameter correlations in large-scale duplicate document detection
Published in Knowledge and information systems (01-02-2008)“…Although much work has been done on duplicate document detection (DDD) and its applications, we observe the absence of a systematic study on the performance…”
Get full text
Journal Article -
11
Online social network measurements and search privacy protection
Get full text
Dissertation