Author image not provided
 Christo Wilson

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article9.00
Citation Count225
Publication count25
Publication years2013-2017
Available for download23
Average downloads per article646.13
Downloads (cumulative)14,861
Downloads (12 Months)8,468
Downloads (6 Weeks)856
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


31 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 31
Result page: 1 2

Sort by:

1
April 2018 WWW '18: Proceedings of the 2018 World Wide Web Conference
Publisher: International World Wide Web Conferences Steering Committee
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 50,   Downloads (12 Months): 273,   Downloads (Overall): 273

Full text available: HtmlHtml  PDFPDF
Ridesharing services such as Uber and Lyft have become an important part of the Vehicle For Hire (VFH) market, which used to be dominated by taxis. Unfortunately, ridesharing services are not required to share data like taxi services, which has made it challenging to compare the competitive dynamics of these ...
Keywords: Lyft, Uber, ridesharing, sharing economy, taxi, vehicle for hire

2
April 2018 WWW '18: Proceedings of the 2018 World Wide Web Conference
Publisher: International World Wide Web Conferences Steering Committee
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 95,   Downloads (12 Months): 467,   Downloads (Overall): 468

Full text available: HtmlHtml  PDFPDF
Search engines are a primary means through which people obtain information in today»s connected world. Yet, apart from the search engine companies themselves, little is known about how their algorithms filter, rank, and present the web to users. This question is especially pertinent with respect to political queries, given growing ...
Keywords: autocomplete search suggestions, filter bubble, political personalization, search engine manipulation, search engine results, search ranking bias

3 published by ACM
April 2018 CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 50,   Downloads (12 Months): 200,   Downloads (Overall): 200

Full text available: PDFPDF
In this work we investigate gender-based inequalities in the context of resume search engines , which are tools that allow recruiters to proactively search for candidates based on keywords and filters. If these ranking algorithms take demographic features into account (directly or indirectly), they may produce rankings that disadvantage some ...
Keywords: algorithm auditing, discrimination, information retrieval

4 published by ACM
February 2018 Communications of the ACM: Volume 61 Issue 3, March 2018
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 326,   Downloads (12 Months): 4,363,   Downloads (Overall): 4,363

Full text available: HtmlHtml  PDFPDF
A properly managed public key infrastructure (PKI) is critical to ensure secure communication on the Internet. Surprisingly, some of the most important administrative steps---in particular, reissuing new X.509 certificates and revoking old ones---are manual and remained unstudied, largely because it is difficult to measure these manual processes at scale. We ...

5 published by ACM
December 2017 Middleware '17: Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 14,   Downloads (12 Months): 106,   Downloads (Overall): 106

Full text available: PDFPDF
Internet censorship is pervasive across the world. However, in some countries like China, even legal , nonpolitical services ( e.g. , Google Scholar) are incidentally blocked by extreme censorship machinery. Therefore, properly accessing legal Internet services under extreme censorship becomes a critical problem. In this paper, we conduct a case ...

6 published by ACM
December 2017 Proceedings of the ACM on Human-Computer Interaction: Volume 1 Issue CSCW, November 2017
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 18,   Downloads (12 Months): 85,   Downloads (Overall): 85

Full text available: PDFPDF
A recent series of experiments demonstrated that introducing ranking bias to election-related search engine results can have a strong and undetectable influence on the preferences of undecided voters. This phenomenon, called the Search Engine Manipulation Effect (SEME), exerts influence largely through order effects that are enhanced in a digital context. ...
Keywords: algorithmic influence, persuasive technology, search engine bias, search engine manipulation effect (seme), voter manipulation

7 published by ACM
November 2017 IMC '17: Proceedings of the 2017 Internet Measurement Conference
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 8,   Downloads (12 Months): 69,   Downloads (Overall): 69

Full text available: PDFPDF
The Domain Name System (DNS) provides a scalable, flexible name resolution service. Unfortunately, its unauthenticated architecture has become the basis for many security attacks. To address this, DNS Security Extensions (DNSSEC) were introduced in 1997. DNSSEC's deployment requires support from the top-level domain (TLD) registries and registrars, as well as ...
Keywords: DNS, DNS operator, DNS security extension, DNSSEC, PKI, public key infrastructure, registrar

8
August 2017 SEC'17: Proceedings of the 26th USENIX Conference on Security Symposium
Publisher: USENIX Association
Bibliometrics:
Citation Count: 2

The Domain Name System's Security Extensions (DNSSEC) allow clients and resolvers to verify that DNS responses have not been forged or modified inflight. DNSSEC uses a public key infrastructure (PKI) to achieve this integrity, without which users can be subject to a wide range of attacks. However, DNSSEC can operate ...

9 published by ACM
July 2017 ACM Transactions on the Web (TWEB): Volume 11 Issue 4, September 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 13,   Downloads (12 Months): 199,   Downloads (Overall): 248

Full text available: PDFPDF
The next generation of Internet services is driven by users and user-generated content. The complex nature of user behavior makes it highly challenging to manage and secure online services. On one hand, service providers cannot effectively prevent attackers from creating large numbers of fake identities to disseminate unwanted content (e.g., ...
Keywords: Clickstream, behavior model, online social networks, spam and abuse

10 published by ACM
February 2017 CSCW '17: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 23,   Downloads (12 Months): 294,   Downloads (Overall): 381

Full text available: PDFPDF
Online freelancing marketplaces have grown quickly in recent years. In theory, these sites offer workers the ability to earn money without the obligations and potential social biases associated with traditional employment frameworks. In this paper, we study whether two prominent online freelance marketplaces - TaskRabbit and Fiverr - are impacted ...
Keywords: gig economy, linguistic analysis, discrimination, information retrieval

11 published by ACM
February 2017 ACM SIGecom Exchanges: Volume 15 Issue 2, January 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 9,   Downloads (12 Months): 121,   Downloads (Overall): 184

Full text available: PDFPDF
In this letter, we briefly summarize two recent works from our group that use observational data to study the mechanisms used by two large markets. First, we examine Uber's surge price algorithm, and observe that its incentive model may not be effective at changing driver behavior. Second, we study the ...
Keywords: Amazon, ridesharing, dynamic pricing, Uber, market design, observational study, empirical, pricing

12 published by ACM
November 2016 IMC '16: Proceedings of the 2016 Internet Measurement Conference
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 7,   Downloads (12 Months): 67,   Downloads (Overall): 309

Full text available: PDFPDF
SSL and TLS are used to secure the most commonly used Internet protocols. As a result, the ecosystem of SSL certificates has been thoroughly studied, leading to a broad understanding of the strengths and weaknesses of the certificates accepted by most web browsers. Prior work has naturally focused almost exclusively ...
Keywords: certificates, https, x.509, invalid certificates, pki, ssl, tls

13 published by ACM
November 2016 IMC '16: Proceedings of the 2016 Internet Measurement Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 10,   Downloads (12 Months): 179,   Downloads (Overall): 507

Full text available: PDFPDF
One advertising format that has grown significantly in recent years are known as Content Recommendation Networks (CRNs). CRNs are responsible for the widgets full of links that appear under headlines like "Recommended For You" and "Things You Might Like". Although CRNs have become quite popular with publishers, users complain about ...
Keywords: advertisement, content recommendation networks, recommendations

14 published by ACM
November 2016 IMC '16: Proceedings of the 2016 Internet Measurement Conference
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 9,   Downloads (12 Months): 80,   Downloads (Overall): 336

Full text available: PDFPDF
Many popular, free online services provide cross-platform interfaces via Web browsers as well as apps on iOS and Android. To monetize these services, many additionally include tracking and advertising libraries that gather information about users with significant privacy implications. Given that the Web-based and mobile-app-based ecosystems evolve independently, an important ...
Keywords: online, personally identifiable information, pii, tracking, advertising, analytics, application, domains, measurement, privacy, web, app-vs-web, appvsweb, leak, leaks, app, app vs web, mobile, website

15 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 7
Downloads (6 Weeks): 23,   Downloads (12 Months): 293,   Downloads (Overall): 797

Full text available: PDFPDF
The semantics of online authentication in the web are rather straightforward: if Alice has a certificate binding Bob's name to a public key, and if a remote entity can prove knowledge of Bob's private key, then (barring key compromise) that remote entity must be Bob. However, in reality, many websites' ...
Keywords: CDN, HTTPs, PKI, SSL, TLS, certificates, content delivery network, key management, key sharing, public key infrastructure

16
August 2016 SEC'16: Proceedings of the 25th USENIX Conference on Security Symposium
Publisher: USENIX Association
Bibliometrics:
Citation Count: 0

Numerous surveys have shown that Web users are concerned about the loss of privacy associated with online tracking. Alarmingly, these surveys also reveal that people are also unaware of the amount of data sharing that occurs between ad exchanges, and thus underestimate the privacy risks associated with online tracking. In ...

17
April 2016 WWW '16: Proceedings of the 25th International Conference on World Wide Web
Publisher: International World Wide Web Conferences Steering Committee
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 6,   Downloads (12 Months): 43,   Downloads (Overall): 130

Full text available: PDFPDF
Maps have long played a crucial role in enabling people to conceptualize and navigate the world around them. However, maps also encode the world-views of their creators. Disputed international borders are one example of this: governments may mandate that cartographers produce maps that conform to their view of a territorial ...
Keywords: maps, measurement, personalization

18
April 2016 WWW '16: Proceedings of the 25th International Conference on World Wide Web
Publisher: International World Wide Web Conferences Steering Committee
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 52,   Downloads (12 Months): 229,   Downloads (Overall): 489

Full text available: PDFPDF
The rise of e-commerce has unlocked practical applications for algorithmic pricing (also called dynamic pricing algorithms), where sellers set prices using computer algorithms. Travel websites and large, well known e-retailers have already adopted algorithmic pricing strategies, but the tools and techniques are now available to small-scale sellers as well. While ...
Keywords: algorithmic pricing, dynamic pricing algorithms, e-commerce

19
March 2016 NSDI'16: Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation
Publisher: USENIX Association
Bibliometrics:
Citation Count: 0

As mobile cellular devices and traffic continue their rapid growth, providers are taking larger steps to optimize traffic, with the hopes of improving user experiences while reducing congestion and bandwidth costs. This paper presents the design, deployment, and experiences with Baidu TrafficGuard, a cloud-based mobile proxy that reduces cellular traffic ...

20 published by ACM
November 2015 COSN '15: Proceedings of the 2015 ACM on Conference on Online Social Networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 17,   Downloads (Overall): 93

Full text available: PDFPDF
Measurement studies of online social networks show that all sociallinks are not equal, and the strength of each link is best characterized by the frequency of interactions between the linked users. To date, few studies have been able to examine detailed interaction data over time, and studied the problem of ...
Keywords: dynamics model, online social network, social interactions



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us