Learn More
One of the most compelling social questions, which until now was left unanswered by current technology, is "Who's that?" This question is usually asked about a new unfamiliar person in a social setting who piques your curiosity. This article presents WhozThat, a system that ties together online social networks with mobile smart- phones to answer this common(More)
Group recommendation, which makes recommendations to a group of users instead of individuals, has become increasingly important in both the workspace and people's social activities, such as brainstorming sessions for coworkers and social TV for family members or friends. Group recommendation is a challenging problem due to the dynamics of group memberships(More)
Social network information is now being used in ways for which it may have not been originally intended. In particular , increased use of smartphones capable of running applications which access social network information enable applications to be aware of a user's position and preferences. However, current models for exchange of this information require(More)
Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of smartphones capable ofrunning applications which access social network information enable applications to be aware of a user's location and preferences. However, current models forexchange of this information require users(More)
The bacteriophage population is large, dynamic, ancient, and genetically diverse. Limited genomic information shows that phage genomes are mosaic, and the genetic architecture of phage populations remains ill-defined. To understand the population structure of phages infecting a single host strain, we isolated, sequenced, and compared 627 phages of(More)
Traffic anomalies and distributed attacks are commonplace in today's networks. Single point detection is often insufficient to determine the causes, patterns and prevalence of such events. Most existing distributed intrusion detection systems (DIDS) rely on centralized fusion, or distributed fusion with unscalable communication mechanisms. In this paper, we(More)
This paper presents a vision of mobile-cloud computing systems which looks beyond simply moving data processing from mobile to cloud computing systems and considers a larger vision in which services within the cloud are aggre-gated and automatically integrated in real-time, based on context, to satisfy the intentions of mobile computing applications. We(More)
Our experiences deploying a wide area wireless sensor network (WSN) in the wildfires of Idaho motivate the need for a software middleware system capable of remotely managing many sensor nodes deployed in widely disparate geographic regions. This requirement is unlike the localized focus of many traditional WSN middleware systems, which manage a group of(More)
Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of personal data are now done through social networks and their APIs, which do not fit the previous research-centric data set release model, nor do they allow for clear assumptions about(More)
In this paper, we identify mobile social networks as an important new direction of research in mobile computing, and show how an expanded definition of mobile social networks that includes sensor networks can enable exciting new context-aware applications, such as context-aware video screens, music jukeboxes, and mobile health applications. We offer(More)