Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Other Computer Sciences
Detection And Prevention Of Abuse In Online Social Networks, Sajedul Karim Talukder
Detection And Prevention Of Abuse In Online Social Networks, Sajedul Karim Talukder
FIU Electronic Theses and Dissertations
Adversaries leverage social networks to collect sensitive data about regular users and target them with abuse that includes fake news, cyberbullying, malware distribution, and propaganda. Such behavior is more effective when performed by the social network friends of victims. In two preliminary user studies we found that 71 out of 80 participants have at least 1 Facebook friend with whom (1) they never interact, either in Facebook or in real life, or whom they believe is (2) likely to abuse their posted photos or status updates, or (3) post offensive, false or malicious content. Such friend abuse is often considered …
Techniques For Efficient Execution Of Large-Scale Scientific Workflows In Distributed Environments, Selim Kalayci
Techniques For Efficient Execution Of Large-Scale Scientific Workflows In Distributed Environments, Selim Kalayci
FIU Electronic Theses and Dissertations
Scientific exploration demands heavy usage of computational resources for large-scale and deep analysis in many different fields. The complexity or the sheer scale of the computational studies can sometimes be encapsulated in the form of a workflow that is made up of numerous dependent components. Due to its decomposable and parallelizable nature, different components of a scientific workflow may be mapped over a distributed resource infrastructure to reduce time to results. However, the resource infrastructure may be heterogeneous, dynamic, and under diverse administrative control. Workflow management tools are utilized to help manage and deal with various aspects in the lifecycle …