100 papers:
- HT-2015-Jain #automation #social
- Automated Methods for Identity Resolution across Heterogeneous Social Platforms (PJ), pp. 307–310.
- CHI-2015-AmmariKLS #how #online #what
- Managing Children’s Online Identities: How Parents Decide what to Disclose about their Children Online (TA, PK, CL, SYS), pp. 1895–1904.
- CHI-2015-HaimsonBMC #online
- Online Inspiration and Exploration for Identity Reinvention (OLH, AEB, EFM, EFC), pp. 3809–3818.
- CSCW-2015-Leavitt #community #online #quote #single use
- “This is a Throwaway Account”: Temporary Technical Identities and Perceptions of Anonymity in a Massive Online Community (AL), pp. 317–327.
- SCSM-2015-PriceMMGBA #multi #named
- Inter-Social-Networking: Accounting for Multiple Identities (DP, DM, RM, CG, MAB, SA), pp. 242–252.
- SIGMOD-2014-LiuWZZK #behaviour #modelling #named #scalability #social
- HYDRA: large-scale social identity linkage via heterogeneous behavior modeling (SL, SW, FZ, JZ, RK), pp. 51–62.
- CSCW-2014-JohriS #framework
- The role of data in aligning the “unique identity” infrastructure in India (AJ, JS), pp. 697–709.
- CSCW-2014-LingelNB #network #online
- City, self, network: transnational migrants and online identity work (JL, MN, DB), pp. 1502–1510.
- CSCW-2014-TausczikDK #community #online
- Building loyalty to online communities through bond and identity-based attachment to sub-groups (YRT, LAD, REK), pp. 146–157.
- HCI-AS-2014-MateiRR #quantifier
- Refreshing Quantification and other Ploys to Give Up the Habit — A Repertoire of Relations, Identities, and Rhetorical Devices in Smoking Cessation Applications (SM, CR, RR), pp. 265–276.
- LCT-TRE-2014-OliveiraM #learning #network #research
- Digital Identity of Researchers and Their Personal Learning Network (NRO, LM), pp. 467–477.
- SCSM-2014-FrischlichRR #identification #social
- I’d Rather Die Than Be with You: The Effects of Mortality Salience and Negative Social Identity on Identification with a Virtual Group (LF, DR, OR), pp. 440–451.
- KR-2014-BeekSH #semantics #set #web
- Rough Set Semantics for Identity on the Web (WB, SS, FvH).
- ICDAR-2013-YadavCK #using
- Most Discriminative Primitive Selection for Identity Determination Using Handwritten Devanagari Script (NY, SC, PKK), pp. 1390–1394.
- CHI-2013-CafaroPLRR #exclamation #interactive
- I see you there!: developing identity-preserving embodied interaction for museum exhibits (FC, AP, LL, JR, JR), pp. 1911–1920.
- CHI-2013-ParkerMGACJM #health #online #what
- I am what i eat: identity & critical thinking in an online health forum for kids (AGP, IM, CG, VA, WC, VJ, EDM), pp. 2437–2446.
- CHI-2013-VermeulenLHC #execution
- Crossing the bridge over norman’s gulf of execution: revealing feedforward’s true identity (JV, KL, EvdH, KC), pp. 1931–1940.
- DUXU-WM-2013-BucchianicoCP #analysis #communication #towards #visual notation
- Branding “for All”: Toward the Definition of Inclusive Toolkits of Analysis and Visual Communication for Brand Identities (GDB, SC, SP), pp. 23–29.
- HCI-UC-2013-AnguloW #online #prototype
- Identity Management through “Profiles”: Prototyping an Online Information Segregation Service (JA, EW), pp. 10–19.
- HCI-UC-2013-HermannSTKS #concept #distributed #multi #network #social #user interface
- The di.me User Interface: Concepts for Sharing Personal Information via Multiple Identities in a Decentralized Social Network (FH, AS, ST, CK, SS), pp. 29–38.
- HCI-UC-2013-RossvollF #social #social media
- Trustworthy and Inclusive Identity Management for Applications in Social Media (THR, LF), pp. 68–77.
- VLDB-2012-BoldiBGT #graph #injection #nondeterminism #obfuscation
- Injecting Uncertainty in Graphs for Identity Obfuscation (PB, FB, AG, TT), pp. 1376–1387.
- ICSM-2012-KoutersVSB #gnome #repository #using
- Who’s who in Gnome: Using LSA to merge software repository identities (EK, BV, AS, MvdB), pp. 592–595.
- STOC-2012-ForbesS #on the #rank #testing
- On identity testing of tensors, low-rank recovery and compressed sensing (MAF, AS), pp. 163–172.
- STOC-2012-HrubesT #proving
- Short proofs for the determinant identities (PH, IT), pp. 193–212.
- CHI-2012-GulottaFM #image #online #risk management
- Curation, provocation, and digital identity: risks and motivations for sharing provocative images online (RG, HF, JM), pp. 387–390.
- CHI-2012-VoidaBOOD #distributed
- Cross-cutting faultlines of location and shared identity in the intergroup cooperation of partially distributed groups (AV, NB, JSO, GMO, LD), pp. 3101–3110.
- CSCW-2012-BrownLB #design #developer #effectiveness
- Interactional identity: designers and developers making joint work meaningful and effective (JMB, GL, RB), pp. 1381–1390.
- CSCW-2012-DabbishFKP #online
- Fresh faces in the crowd: turnover, identity, and commitment in online groups (LAD, RF, RK, TP), pp. 245–248.
- CIKM-2012-ChenZMZ #social
- 4Is of social bully filtering: identity, inference, influence, and intervention (YC, LZ, AM, YZ), pp. 2677–2679.
- CIKM-2012-MurakamiM #how #people #question #web
- How do humans distinguish different people with identical names on the web? (HM, YM), pp. 2475–2478.
- ICPR-2012-NejatiZSM0 #identification #image
- Wonder ears: Identification of identical twins from ear images (HN, LZ, TS, EMM, DG), pp. 1201–1204.
- SAC-2012-NunesCM #learning #network #similarity #social
- Resolving user identities over social networks through supervised learning and rich similarity features (AN, PC, BM), pp. 728–729.
- DocEng-2011-BalinskyCS #documentation #encryption
- Publicly posted composite documents with identity based encryption (HB, LC, SJS), pp. 239–248.
- HT-2011-Landow #education #effectiveness #web #wiki
- The victorian web and the victorian course wiki: comparing the educational effectiveness of identical assignments in web 1.0 and web 2.0 (GPL), pp. 305–312.
- STOC-2011-SarafV #black box #multi #testing
- Black-box identity testing of depth-4 multilinear circuits (SS, IV), pp. 421–430.
- STOC-2011-SaxenaS #bound #matter #testing
- Blackbox identity testing for bounded top fanin depth-3 circuits: the field doesn’t matter (NS, CS), pp. 431–440.
- ICALP-v2-2011-BeeckenMS #algebra #independence #testing
- Algebraic Independence and Blackbox Identity Testing (MB, JM, NS), pp. 137–148.
- CHI-2011-DiSalvoYGMMPB
- African American men constructing computing identity (BJD, SY, MG, TM, CM, KP, AB), pp. 2967–2970.
- CHI-2011-MaratheS #question #what
- What drives customization?: control or identity? (SM, SSS), pp. 781–790.
- CHI-2011-YeeDYN
- Do men heal more when in drag?: conflicting identity cues between user and avatar (NY, ND, MY, LN), pp. 773–776.
- CSCW-2011-FarnhamC #online #social
- Faceted identity, faceted lives: social and technical issues with being yourself online (SF, EFC), pp. 359–368.
- CAiSE-2011-SunLZLY #comprehension
- Understanding the Diversity of Services Based on Users’ Identities (JS, FL, HZ, LL, ESKY), pp. 612–626.
- ECSA-2010-AndersenC #challenge
- Identity Management Mismatch Challenges in the Danish Municipality Administration System (MSA, HBC), pp. 476–479.
- DocEng-2010-ThaoM #data type #detection #using #version control #xml
- Using versioned tree data structure, change detection and node identity for three-way XML merging (CT, EVM), pp. 77–86.
- STOC-2010-KarninMSV #bound #multi #testing
- Deterministic identity testing of depth-4 multilinear circuits with bounded top fan-in (ZSK, PM, AS, IV), pp. 649–658.
- STOC-2010-Svensson #precedence #scheduling
- Conditional hardness of precedence constrained scheduling on identical machines (OS), pp. 745–754.
- ICALP-v1-2010-ShpilkaV #on the #polynomial #testing
- On the Relation between Polynomial Identity Testing and Finding Variable Disjoint Factors (AS, IV), pp. 408–419.
- CHI-2010-MamykinaMMG
- Constructing identities through storytelling in diabetes management (LM, ADM, EDM, DG), pp. 1203–1212.
- ICPR-2010-WilliamsTSB #analysis #multi #verification
- Body Motion Analysis for Multi-modal Identity Verification (GW, GWT, KS, CB), pp. 2198–2201.
- ICPR-2010-WongSML
- Dynamic Amelioration of Resolution Mismatches for Local Feature Based Identity Inference (YW, CS, SM, BCL), pp. 1200–1203.
- ICSE-2010-Staite #re-engineering
- Portable secure identity management for software engineering (CS), pp. 325–326.
- HPDC-2010-JabriM #using
- Authorization within grid-computing using certificateless identity-based proxy signature (MAJ, SM), pp. 292–295.
- CHI-2009-GonzalesFD #question
- (Perceived) interactivity: does interactivity increase enjoyment and creative identity in artistic spaces? (ALG, TF, SPD), pp. 415–418.
- CHI-2009-WakkaryT #design
- A sustainable identity: the creativity of an everyday designer (RW, KT), pp. 365–374.
- DHM-2009-FaustC #3d
- 3D Body Scanning’s Contribution to the Use of Apparel as an Identity Construction Tool (MEF, SC), pp. 19–28.
- OCSC-2009-TakeuchiN
- Attribution of Identity in Autonomous Action of Remotely Operated Robot (YT, HN), pp. 265–271.
- ICML-2009-Tillman #distributed #independence #learning
- Structure learning with independent non-identically distributed data (RET), pp. 1041–1048.
- SOSP-2009-DunaganZS #combinator #graph #named #optimisation #using
- Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs (JD, AXZ, DRS), pp. 305–320.
- HT-2008-StefanoneLR #web
- We’re all stars now: reality television, web 2.0, and mediated identities (MS, DL, DR), pp. 107–112.
- SIGMOD-2008-LiuT #graph #towards
- Towards identity anonymization on graphs (KL, ET), pp. 93–106.
- STOC-2008-ShpilkaV #polynomial #testing
- Read-once polynomial identity testing (AS, IV), pp. 507–516.
- ICALP-A-2008-Saxena #bound #testing
- Diagonal Circuit Identity Testing and Lower Bounds (NS), pp. 60–71.
- HIMI-IIE-2007-Bhargav-SpantzelSYB #privacy #requirements
- Privacy Requirements in Identity Management Solutions (ABS, ACS, MY, EB), pp. 694–702.
- OCSC-2007-KimQ #community
- Presentation Desire of Digital Identity in Virtual Community (HWK, EQ), pp. 96–105.
- ECOOP-2007-VaziriTFD #declarative #using
- Declarative Object Identity Using Relation Types (MV, FT, SF, JD), pp. 54–78.
- CSL-2007-FournierGGZ #logic
- Classical and Intuitionistic Logic Are Asymptotically Identical (HF, DG, AG, MZ), pp. 177–193.
- SIGMOD-2006-Jonas #experience #scalability
- Identity resolution: 23 years of practical experience and observations at scale (JJ), p. 718.
- ICALP-v2-2006-AbdallaCDMNS #encryption
- Identity-Based Encryption Gone Wild (MA, DC, AWD, JML, GN, NPS), pp. 300–311.
- ICPR-v4-2006-ShuD #multi #verification
- Multi-Biometrics Fusion for Identity Verification (CS, XD), pp. 493–496.
- LICS-2006-TatsutaD #difference #normalisation
- Normalisation is Insensible to λ-Term Identity or Difference (MT, MDC), pp. 327–338.
- STOC-2005-DvirS #polynomial #query #testing
- Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits (ZD, AS), pp. 592–601.
- ICALP-2005-Galindo #encryption #revisited
- Boneh-Franklin Identity Based Encryption Revisited (DG), pp. 791–802.
- HPDC-2005-Thain #grid
- Identity boxing: secure user-level containment for the grid (DT), pp. 299–300.
- CADE-2005-Zhang
- Computer Search for Counterexamples to Wilkie’s Identity (JZ0), pp. 441–451.
- ICDAR-2003-Fairhurst #authentication #documentation #future of #verification
- Document Identity, Authentication and Ownership: The Future of Biometric Verification (MCF), p. 1108–?.
- STOC-2003-KabanetsI #bound #polynomial #proving #testing
- Derandomizing polynomial identity tests means proving circuit lower bounds (VK, RI), pp. 355–364.
- CSL-2003-KanovichV #problem
- Coping Polynomially with Numerous but Identical Elements within Planning Problems (MIK, JV), pp. 285–298.
- KR-2002-Bennett #physics
- Physical Objects, Identity and Vagueness (BB), pp. 395–408.
- ICDAR-2001-LladosLCQ #automation #named
- ICAR: Identity Card Automatic Reader (JL, FL, VC, JQ), pp. 470–475.
- VLDB-2001-Gentili #architecture
- Italian Electronic Identity Card — principle and architecture (MG), pp. 629–632.
- STOC-2001-KlivansS #multi #performance #testing
- Randomness efficient identity testing of multivariate polynomials (AK, DAS), pp. 216–223.
- CHI-2001-BersGD #community
- Identity construction environments: supporting a virtual therapeutic community of pediatric patients undergoing dialysis (MUB, JGH, DRD), pp. 380–387.
- TOOLS-EUROPE-2001-CostanzaSC #component
- Object Identity and Dynamic Recomposition of Components (PC, OS, ABC), pp. 51–65.
- ICML-2000-EspositoFFS #refinement
- Ideal Theory Refinement under Object Identity (FE, NF, SF, GS), pp. 263–270.
- STOC-1998-LewinV #polynomial #question #towards
- Checking Polynomial Identities over any Field: Towards a Derandomization? (DL, SPV), pp. 438–447.
- DLT-1995-Ilie #on the
- On Disjunctivity, Ultimate Periodicity and Ultimate Identity (LI), pp. 44–53.
- RTA-1995-StickelZ #problem
- Studying Quasigroup Identities by Rewriting Techniques: Problems and First Results (MES, HZ), pp. 450–456.
- ECOOP-1994-LopezFB #constraints
- Constraints and Object Identity (GL, BNFB, AB), pp. 260–279.
- LICS-1994-HofmannS #proving
- The Groupoid Model Refutes Uniqueness of Identity Proofs (MH, TS), pp. 208–212.
- CIKM-1993-ChengGN #database #parametricity
- Object Identity and Dimension Alignment in Parametric Databases (TSC, SKG, SSN), pp. 615–624.
- SIGMOD-1991-VandenbergD #algebra #array #inheritance
- Algebraic Support for Complex Objects with Arrays, Identity, and Inheritance (SLV, DJD), pp. 158–167.
- KR-1991-GroveH #logic #multi
- Naming and Identity in a Multi-Agent Epistemic Logic (AJG, JYH), pp. 301–312.
- ICALP-1990-Krob
- A Complete System of B-Rational Identities (DK), pp. 60–73.
- SIGMOD-1989-AbiteboulK #query
- Object Identity as a Query Language Primitive (SA, PCK), pp. 159–173.
- RTA-1989-BairdPW #commutative #reduction #set
- Complete Sets of Reductions Modulo Associativity, Commutativity and Identity (TBB, GEP, RWW), pp. 29–44.
- STOC-1987-FeigeFS #proving
- Zero Knowledge Proofs of Identity (UF, AF, AS), pp. 210–217.
- OOPSLA-1986-KhoshafianC
- Object Identity (SK, GPC), pp. 406–416.
- ICALP-1976-LongoZ #formal method
- A Theory of Computation with an Identity Discriminator (GL, MVZ), pp. 147–167.
- DAC-1973-UlrichB #concurrent #network #simulation
- The concurrent simulation of nearly identical digital networks (EGU, TEB), pp. 145–150.