Developing Library Cyberinfrastructure Strategy for Big Data Sharing and Reuse

Start Date: 06/01/2016
End Date: 05/31/2018

Grant Institution: IMLS

Amount: $308,175

People associated with this grant:

Edward Fox

I Am the Antenna: Accurate Outdoor AP Location Using Smartphones

Zhang, Z., X. Zhou, W. Zhang, Y. Zhang, G. Wang, B. Y. Zhao, and H. Zheng, "I Am the Antenna: Accurate Outdoor AP Location Using Smartphones", Proc. of the 17th Annual International Conference on Mobile Computing and Networking (MobiCom), 2011.

Social Turing Tests: Crowdsourcing Sybil Detection

Wang, G., M. Mohanlal, C. Wilson, X. Wang, M. Metzger, H. Zheng, and B. Y. Zhao, "Social Turing Tests: Crowdsourcing Sybil Detection", Proc. of The 20th Annual Network Distributed System Security Symposium (NDSS), 2013.

Wisdom in the Social Crowd: An Analysis of Quora

Wang, G., K. Gill, M. Mohanlal, H. Zheng, and B. Y. Zhao, "Wisdom in the Social Crowd: An Analysis of Quora", Proc. of the 22Nd International Conference on World Wide Web (WWW), 2013.

Practical Conflict Graphs for Dynamic Spectrum Distribution

Zhou, X., Z. Zhang, G. Wang, X. Yu, B. Y. Zhao, and H. Zheng, "Practical Conflict Graphs for Dynamic Spectrum Distribution", Proc. of the ACM SIGMETRICS/International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), 2013.

Detecting Malicious Landing Pages in Malware Distribution Networks

Wang, G., J. W. Stokes, C. Herley, and D. Felstead, "Detecting Malicious Landing Pages in Malware Distribution Networks", Proc. of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013.