02-14-2019
|
Using Key Player Analysis as a Method for Examining the
Role of Community Animators in Technology Adoption
by
Jomara Sandbulte
et al
|
02-12-2019
|
Coloring in the Links: Capturing Social Ties as They
are Perceived
by
Sebastian Deri
et al
|
02-12-2019
|
RTbust: Exploiting Temporal Patterns for Botnet
Detection on Twitter
by
Michele Mazza
et al
|
02-15-2019
|
On the computational models for the analysis of illicit
activities
by
Sarwat Nizamani
et al
|
02-13-2019
|
Mathematical Notions vs. Human Perception of Fairness:
A Descriptive Approach to Fairness for Machine Learning
by
Megha Srivastava
et al
|
02-13-2019
|
A Framework towards Quantifying Human Restorativeness
in Virtual Built Environments
by
Zhengbo Zou
et al
|
02-15-2019
|
Crime Analysis using Open Source Information
by
Sarwat Nizamani
et al
|
02-13-2019
|
SoK: Transparent Dishonesty: front-running attacks on
Blockchain
by
Shayan Eskandari
et al
|
02-15-2019
|
Who Watches the Watchmen: Exploring Complaints on the
Web
by
Damilola Ibosiola
et al
|