It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
This paper discusses fast parallel algorithms for evaluating several centrality indices frequently used in complex network analysis. These algorithms have been optimized to exploi...
Abstract. The success of recent Web 2.0 platforms shows that people share information and resources within their social community and beyond. The use of these platforms in an e-lea...
Fabian Abel, Ivana Marenzi, Wolfgang Nejdl, Sergej...
This paper summarizes value analysis of adopting technologysupported attendance control service in a primary school. The results are based on a case study that explored a 14-week ...
Minna Isomursu, Mari Ervasti, Marianne Kinnula, Pe...
People tend to form social networks within geographical areas. This can be explained by the fact that generally geographical localities correspond to common interests (e.g. studen...