Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Big data analytics and the limits of privacy self-management
This article looks at how the logic of big data analytics, which promotes an aura of
unchallenged objectivity to the algorithmic analysis of quantitative data, preempts …
unchallenged objectivity to the algorithmic analysis of quantitative data, preempts …
Privacy preference modeling and prediction in a simulated campuswide IoT environment
With the advent of the Internet of Things (IoT), users are more likely to have privacy concerns
since their personal information could be collected, analyzed, and utilized without notice by …
since their personal information could be collected, analyzed, and utilized without notice by …
A machine-learning based approach to privacy-aware information-sharing in mobile social networks
Contextual information about users is increasingly shared on mobile social networks.
Examples of such information include users' locations, events, activities, and the co …
Examples of such information include users' locations, events, activities, and the co …
Adaptive information-sharing for privacy-aware mobile social networks
Personal and contextual information are increasingly shared via mobile social networks.
Users' locations, activities and their co-presence can be shared easily with online" friends" …
Users' locations, activities and their co-presence can be shared easily with online" friends" …
Understanding link sharing tools continuance behavior in social media
Purpose The purpose of this paper is to investigate the continued use behavior (CU) of link
sharing tools based on uses and gratifications theory, the theory of planned behavior and …
sharing tools based on uses and gratifications theory, the theory of planned behavior and …
[KIRJA][B] A linear-processor polylog-time algorithm for shortest paths in planar graphs
PN Klein, S Subramanian - 1993 - ieeexplore.ieee.org
We give an algorithm requiring polylog time and a linear number of processors to solve
single-source shortest paths in directed planar graphs, bounded-genus graphs, and 2 …
single-source shortest paths in directed planar graphs, bounded-genus graphs, and 2 …
Privacy-aware location privacy preference recommendations
Location-Based Services have become increasingly popular due to the prevalence of smart
devices and location-sharing applications such as Facebook and Foursquare. The …
devices and location-sharing applications such as Facebook and Foursquare. The …
Location privacy and utility in geo-social networks: survey and research challenges
Location information sharing on popular online social networking platforms like Facebook
and Foursquare brings mutual benefits for the users of these platforms (eg, free …
and Foursquare brings mutual benefits for the users of these platforms (eg, free …
PDVLoc: A personal data vault for controlled location data sharing
Location-Based Mobile Service (LBMS) is one of the most popular smartphone services.
LBMS enables people to more easily connect with each other and analyze the aspects of …
LBMS enables people to more easily connect with each other and analyze the aspects of …
How well can a user's location privacy preferences be determined without using GPS location data?
The recent proliferation of GPS-enabled mobile phones has allowed people to share their
current locations with others. Because disclosing one's location can be valuable but risky …
current locations with others. Because disclosing one's location can be valuable but risky …