BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
test (11)
onlin (11)
object (9)
social (9)
polynomi (7)

Stem ident$ (all stems)

100 papers:

HTHT-2015-Jain #automation #social
Automated Methods for Identity Resolution across Heterogeneous Social Platforms (PJ), pp. 307–310.
CHICHI-2015-AmmariKLS #how #online #what
Managing Children’s Online Identities: How Parents Decide what to Disclose about their Children Online (TA, PK, CL, SYS), pp. 1895–1904.
CHICHI-2015-HaimsonBMC #online
Online Inspiration and Exploration for Identity Reinvention (OLH, AEB, EFM, EFC), pp. 3809–3818.
CSCWCSCW-2015-Leavitt #community #online #quote #single use
“This is a Throwaway Account”: Temporary Technical Identities and Perceptions of Anonymity in a Massive Online Community (AL), pp. 317–327.
HCISCSM-2015-PriceMMGBA #multi #named
Inter-Social-Networking: Accounting for Multiple Identities (DP, DM, RM, CG, MAB, SA), pp. 242–252.
SIGMODSIGMOD-2014-LiuWZZK #behaviour #modelling #named #scalability #social
HYDRA: large-scale social identity linkage via heterogeneous behavior modeling (SL, SW, FZ, JZ, RK), pp. 51–62.
CSCWCSCW-2014-JohriS #framework
The role of data in aligning the “unique identity” infrastructure in India (AJ, JS), pp. 697–709.
CSCWCSCW-2014-LingelNB #network #online
City, self, network: transnational migrants and online identity work (JL, MN, DB), pp. 1502–1510.
CSCWCSCW-2014-TausczikDK #community #online
Building loyalty to online communities through bond and identity-based attachment to sub-groups (YRT, LAD, REK), pp. 146–157.
HCIHCI-AS-2014-MateiRR #quantifier
Refreshing Quantification and other Ploys to Give Up the Habit — A Repertoire of Relations, Identities, and Rhetorical Devices in Smoking Cessation Applications (SM, CR, RR), pp. 265–276.
HCILCT-TRE-2014-OliveiraM #learning #network #research
Digital Identity of Researchers and Their Personal Learning Network (NRO, LM), pp. 467–477.
HCISCSM-2014-FrischlichRR #identification #social
I’d Rather Die Than Be with You: The Effects of Mortality Salience and Negative Social Identity on Identification with a Virtual Group (LF, DR, OR), pp. 440–451.
KRKR-2014-BeekSH #semantics #set #web
Rough Set Semantics for Identity on the Web (WB, SS, FvH).
ICDARICDAR-2013-YadavCK #using
Most Discriminative Primitive Selection for Identity Determination Using Handwritten Devanagari Script (NY, SC, PKK), pp. 1390–1394.
CHICHI-2013-CafaroPLRR #exclamation #interactive
I see you there!: developing identity-preserving embodied interaction for museum exhibits (FC, AP, LL, JR, JR), pp. 1911–1920.
CHICHI-2013-ParkerMGACJM #health #online #what
I am what i eat: identity & critical thinking in an online health forum for kids (AGP, IM, CG, VA, WC, VJ, EDM), pp. 2437–2446.
CHICHI-2013-VermeulenLHC #execution
Crossing the bridge over norman’s gulf of execution: revealing feedforward’s true identity (JV, KL, EvdH, KC), pp. 1931–1940.
HCIDUXU-WM-2013-BucchianicoCP #analysis #communication #towards #visual notation
Branding “for All”: Toward the Definition of Inclusive Toolkits of Analysis and Visual Communication for Brand Identities (GDB, SC, SP), pp. 23–29.
HCIHCI-UC-2013-AnguloW #online #prototype
Identity Management through “Profiles”: Prototyping an Online Information Segregation Service (JA, EW), pp. 10–19.
HCIHCI-UC-2013-HermannSTKS #concept #distributed #multi #network #social #user interface
The di.me User Interface: Concepts for Sharing Personal Information via Multiple Identities in a Decentralized Social Network (FH, AS, ST, CK, SS), pp. 29–38.
HCIHCI-UC-2013-RossvollF #social #social media
Trustworthy and Inclusive Identity Management for Applications in Social Media (THR, LF), pp. 68–77.
VLDBVLDB-2012-BoldiBGT #graph #injection #nondeterminism #obfuscation
Injecting Uncertainty in Graphs for Identity Obfuscation (PB, FB, AG, TT), pp. 1376–1387.
ICSMEICSM-2012-KoutersVSB #gnome #repository #using
Who’s who in Gnome: Using LSA to merge software repository identities (EK, BV, AS, MvdB), pp. 592–595.
STOCSTOC-2012-ForbesS #on the #rank #testing
On identity testing of tensors, low-rank recovery and compressed sensing (MAF, AS), pp. 163–172.
STOCSTOC-2012-HrubesT #proving
Short proofs for the determinant identities (PH, IT), pp. 193–212.
CHICHI-2012-GulottaFM #image #online #risk management
Curation, provocation, and digital identity: risks and motivations for sharing provocative images online (RG, HF, JM), pp. 387–390.
CHICHI-2012-VoidaBOOD #distributed
Cross-cutting faultlines of location and shared identity in the intergroup cooperation of partially distributed groups (AV, NB, JSO, GMO, LD), pp. 3101–3110.
CSCWCSCW-2012-BrownLB #design #developer #effectiveness
Interactional identity: designers and developers making joint work meaningful and effective (JMB, GL, RB), pp. 1381–1390.
CSCWCSCW-2012-DabbishFKP #online
Fresh faces in the crowd: turnover, identity, and commitment in online groups (LAD, RF, RK, TP), pp. 245–248.
CIKMCIKM-2012-ChenZMZ #social
4Is of social bully filtering: identity, inference, influence, and intervention (YC, LZ, AM, YZ), pp. 2677–2679.
CIKMCIKM-2012-MurakamiM #how #people #question #web
How do humans distinguish different people with identical names on the web? (HM, YM), pp. 2475–2478.
ICPRICPR-2012-NejatiZSM0 #identification #image
Wonder ears: Identification of identical twins from ear images (HN, LZ, TS, EMM, DG), pp. 1201–1204.
SACSAC-2012-NunesCM #learning #network #similarity #social
Resolving user identities over social networks through supervised learning and rich similarity features (AN, PC, BM), pp. 728–729.
DocEngDocEng-2011-BalinskyCS #documentation #encryption
Publicly posted composite documents with identity based encryption (HB, LC, SJS), pp. 239–248.
HTHT-2011-Landow #education #effectiveness #web #wiki
The victorian web and the victorian course wiki: comparing the educational effectiveness of identical assignments in web 1.0 and web 2.0 (GPL), pp. 305–312.
STOCSTOC-2011-SarafV #black box #multi #testing
Black-box identity testing of depth-4 multilinear circuits (SS, IV), pp. 421–430.
STOCSTOC-2011-SaxenaS #bound #matter #testing
Blackbox identity testing for bounded top fanin depth-3 circuits: the field doesn’t matter (NS, CS), pp. 431–440.
ICALPICALP-v2-2011-BeeckenMS #algebra #independence #testing
Algebraic Independence and Blackbox Identity Testing (MB, JM, NS), pp. 137–148.
CHICHI-2011-DiSalvoYGMMPB
African American men constructing computing identity (BJD, SY, MG, TM, CM, KP, AB), pp. 2967–2970.
CHICHI-2011-MaratheS #question #what
What drives customization?: control or identity? (SM, SSS), pp. 781–790.
CHICHI-2011-YeeDYN
Do men heal more when in drag?: conflicting identity cues between user and avatar (NY, ND, MY, LN), pp. 773–776.
CSCWCSCW-2011-FarnhamC #online #social
Faceted identity, faceted lives: social and technical issues with being yourself online (SF, EFC), pp. 359–368.
CAiSECAiSE-2011-SunLZLY #comprehension
Understanding the Diversity of Services Based on Users’ Identities (JS, FL, HZ, LL, ESKY), pp. 612–626.
ECSAECSA-2010-AndersenC #challenge
Identity Management Mismatch Challenges in the Danish Municipality Administration System (MSA, HBC), pp. 476–479.
DocEngDocEng-2010-ThaoM #data type #detection #using #version control #xml
Using versioned tree data structure, change detection and node identity for three-way XML merging (CT, EVM), pp. 77–86.
STOCSTOC-2010-KarninMSV #bound #multi #testing
Deterministic identity testing of depth-4 multilinear circuits with bounded top fan-in (ZSK, PM, AS, IV), pp. 649–658.
STOCSTOC-2010-Svensson #precedence #scheduling
Conditional hardness of precedence constrained scheduling on identical machines (OS), pp. 745–754.
ICALPICALP-v1-2010-ShpilkaV #on the #polynomial #testing
On the Relation between Polynomial Identity Testing and Finding Variable Disjoint Factors (AS, IV), pp. 408–419.
CHICHI-2010-MamykinaMMG
Constructing identities through storytelling in diabetes management (LM, ADM, EDM, DG), pp. 1203–1212.
ICPRICPR-2010-WilliamsTSB #analysis #multi #verification
Body Motion Analysis for Multi-modal Identity Verification (GW, GWT, KS, CB), pp. 2198–2201.
ICPRICPR-2010-WongSML
Dynamic Amelioration of Resolution Mismatches for Local Feature Based Identity Inference (YW, CS, SM, BCL), pp. 1200–1203.
ICSEICSE-2010-Staite #re-engineering
Portable secure identity management for software engineering (CS), pp. 325–326.
HPDCHPDC-2010-JabriM #using
Authorization within grid-computing using certificateless identity-based proxy signature (MAJ, SM), pp. 292–295.
CHICHI-2009-GonzalesFD #question
(Perceived) interactivity: does interactivity increase enjoyment and creative identity in artistic spaces? (ALG, TF, SPD), pp. 415–418.
CHICHI-2009-WakkaryT #design
A sustainable identity: the creativity of an everyday designer (RW, KT), pp. 365–374.
HCIDHM-2009-FaustC #3d
3D Body Scanning’s Contribution to the Use of Apparel as an Identity Construction Tool (MEF, SC), pp. 19–28.
HCIOCSC-2009-TakeuchiN
Attribution of Identity in Autonomous Action of Remotely Operated Robot (YT, HN), pp. 265–271.
ICMLICML-2009-Tillman #distributed #independence #learning
Structure learning with independent non-identically distributed data (RET), pp. 1041–1048.
SOSPSOSP-2009-DunaganZS #combinator #graph #named #optimisation #using
Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs (JD, AXZ, DRS), pp. 305–320.
HTHT-2008-StefanoneLR #web
We’re all stars now: reality television, web 2.0, and mediated identities (MS, DL, DR), pp. 107–112.
SIGMODSIGMOD-2008-LiuT #graph #towards
Towards identity anonymization on graphs (KL, ET), pp. 93–106.
STOCSTOC-2008-ShpilkaV #polynomial #testing
Read-once polynomial identity testing (AS, IV), pp. 507–516.
ICALPICALP-A-2008-Saxena #bound #testing
Diagonal Circuit Identity Testing and Lower Bounds (NS), pp. 60–71.
HCIHIMI-IIE-2007-Bhargav-SpantzelSYB #privacy #requirements
Privacy Requirements in Identity Management Solutions (ABS, ACS, MY, EB), pp. 694–702.
HCIOCSC-2007-KimQ #community
Presentation Desire of Digital Identity in Virtual Community (HWK, EQ), pp. 96–105.
ECOOPECOOP-2007-VaziriTFD #declarative #using
Declarative Object Identity Using Relation Types (MV, FT, SF, JD), pp. 54–78.
CSLCSL-2007-FournierGGZ #logic
Classical and Intuitionistic Logic Are Asymptotically Identical (HF, DG, AG, MZ), pp. 177–193.
SIGMODSIGMOD-2006-Jonas #experience #scalability
Identity resolution: 23 years of practical experience and observations at scale (JJ), p. 718.
ICALPICALP-v2-2006-AbdallaCDMNS #encryption
Identity-Based Encryption Gone Wild (MA, DC, AWD, JML, GN, NPS), pp. 300–311.
ICPRICPR-v4-2006-ShuD #multi #verification
Multi-Biometrics Fusion for Identity Verification (CS, XD), pp. 493–496.
LICSLICS-2006-TatsutaD #difference #normalisation
Normalisation is Insensible to λ-Term Identity or Difference (MT, MDC), pp. 327–338.
STOCSTOC-2005-DvirS #polynomial #query #testing
Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits (ZD, AS), pp. 592–601.
ICALPICALP-2005-Galindo #encryption #revisited
Boneh-Franklin Identity Based Encryption Revisited (DG), pp. 791–802.
HPDCHPDC-2005-Thain #grid
Identity boxing: secure user-level containment for the grid (DT), pp. 299–300.
CADECADE-2005-Zhang
Computer Search for Counterexamples to Wilkie’s Identity (JZ0), pp. 441–451.
ICDARICDAR-2003-Fairhurst #authentication #documentation #future of #verification
Document Identity, Authentication and Ownership: The Future of Biometric Verification (MCF), p. 1108–?.
STOCSTOC-2003-KabanetsI #bound #polynomial #proving #testing
Derandomizing polynomial identity tests means proving circuit lower bounds (VK, RI), pp. 355–364.
CSLCSL-2003-KanovichV #problem
Coping Polynomially with Numerous but Identical Elements within Planning Problems (MIK, JV), pp. 285–298.
KRKR-2002-Bennett #physics
Physical Objects, Identity and Vagueness (BB), pp. 395–408.
ICDARICDAR-2001-LladosLCQ #automation #named
ICAR: Identity Card Automatic Reader (JL, FL, VC, JQ), pp. 470–475.
VLDBVLDB-2001-Gentili #architecture
Italian Electronic Identity Card — principle and architecture (MG), pp. 629–632.
STOCSTOC-2001-KlivansS #multi #performance #testing
Randomness efficient identity testing of multivariate polynomials (AK, DAS), pp. 216–223.
CHICHI-2001-BersGD #community
Identity construction environments: supporting a virtual therapeutic community of pediatric patients undergoing dialysis (MUB, JGH, DRD), pp. 380–387.
TOOLSTOOLS-EUROPE-2001-CostanzaSC #component
Object Identity and Dynamic Recomposition of Components (PC, OS, ABC), pp. 51–65.
ICMLICML-2000-EspositoFFS #refinement
Ideal Theory Refinement under Object Identity (FE, NF, SF, GS), pp. 263–270.
STOCSTOC-1998-LewinV #polynomial #question #towards
Checking Polynomial Identities over any Field: Towards a Derandomization? (DL, SPV), pp. 438–447.
DLTDLT-1995-Ilie #on the
On Disjunctivity, Ultimate Periodicity and Ultimate Identity (LI), pp. 44–53.
RTARTA-1995-StickelZ #problem
Studying Quasigroup Identities by Rewriting Techniques: Problems and First Results (MES, HZ), pp. 450–456.
ECOOPECOOP-1994-LopezFB #constraints
Constraints and Object Identity (GL, BNFB, AB), pp. 260–279.
LICSLICS-1994-HofmannS #proving
The Groupoid Model Refutes Uniqueness of Identity Proofs (MH, TS), pp. 208–212.
CIKMCIKM-1993-ChengGN #database #parametricity
Object Identity and Dimension Alignment in Parametric Databases (TSC, SKG, SSN), pp. 615–624.
SIGMODSIGMOD-1991-VandenbergD #algebra #array #inheritance
Algebraic Support for Complex Objects with Arrays, Identity, and Inheritance (SLV, DJD), pp. 158–167.
KRKR-1991-GroveH #logic #multi
Naming and Identity in a Multi-Agent Epistemic Logic (AJG, JYH), pp. 301–312.
ICALPICALP-1990-Krob
A Complete System of B-Rational Identities (DK), pp. 60–73.
SIGMODSIGMOD-1989-AbiteboulK #query
Object Identity as a Query Language Primitive (SA, PCK), pp. 159–173.
RTARTA-1989-BairdPW #commutative #reduction #set
Complete Sets of Reductions Modulo Associativity, Commutativity and Identity (TBB, GEP, RWW), pp. 29–44.
STOCSTOC-1987-FeigeFS #proving
Zero Knowledge Proofs of Identity (UF, AF, AS), pp. 210–217.
OOPSLAOOPSLA-1986-KhoshafianC
Object Identity (SK, GPC), pp. 406–416.
ICALPICALP-1976-LongoZ #formal method
A Theory of Computation with an Identity Discriminator (GL, MVZ), pp. 147–167.
DACDAC-1973-UlrichB #concurrent #network #simulation
The concurrent simulation of nearly identical digital networks (EGU, TEB), pp. 145–150.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.