Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Digital footprint

Known as: Internet footprint, Trace, Cyber Shadow 
There are two main classifications for digital footprints: passive and active. A passive digital footprint is created when data is collected without… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
While big data offer exciting opportunities to address questions about social behavior, studies must not abandon traditionally… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2014
Highly Cited
2014
We report the current state of the graph isomorphism problem from the practical point of view. After describing the general… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to their much lower cost structure… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Learning patterns of human behavior from sensor data is extremely important for high-level activity inference. This paper… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The memory wave in the humanities has contributed to the impressive revival of cultural history, but the success of memory… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
MPEG-4 and H.263 encoded video is expected to account for a large portion of the traffic in future wireline and wireless networks… Expand
  • figure 2
  • figure 3
  • figure 8
  • figure 9
  • table 8
Is this relevant?
Highly Cited
2000
Highly Cited
2000
The bandwidth and latency of a memory system are strongly dependent on the manner in which accesses interact with the "3-D… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Packet delay and loss traces are frequently used by network engineers, as well as network applications, to analyze network… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 8
Is this relevant?
Highly Cited
1995
Highly Cited
1995
Abstract The explosion of WWW traffic necessitates an accurate picture of WWW use, and in particular requires a good… Expand
  • figure 2
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
1995
Highly Cited
1995
The theory of traces belongs to both formal language theory and the theory of concurrent systems. In both these disciplines it is… Expand
Is this relevant?