Sciweavers

170 search results - page 10 / 34
» A Practical Attack to De-anonymize Social Network Users
Sort
View
CSCW
2002
ACM
13 years 7 months ago
Articulating User Needs in Collaborative Design: Towards an Activity-Theoretical Approach
This paper analyses the collaborative design of a high-technology product, a neuromagnetometer used in the analysis of the activity of the human cortex. The producer, Neuromag Com...
Reijo Miettinen, Mervi Hasu
WSDM
2010
ACM
254views Data Mining» more  WSDM 2010»
14 years 5 months ago
Learning Influence Probabilities In Social Networks
Recently, there has been tremendous interest in the phenomenon of influence propagation in social networks. The studies in this area assume they have as input to their problems a ...
Amit Goyal 0002, Francesco Bonchi, Laks V. S. Laks...
ISCC
2008
IEEE
14 years 2 months ago
A sybilproof distributed identity management for P2P networks
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
François Lesueur, Ludovic Mé, Val&ea...
SOCIALCOM
2010
13 years 5 months ago
Building Mobile Social Network with Semantic Relation Using Bayesian NeTwork-based Life-log Mining
Mobile devices such as cell phone, PDA and smart phone have been so popularized that they are to be a necessity for everyday life. These mobile devices can be very useful tools to ...
Han-Saem Park, Sung-Bae Cho
CHI
2010
ACM
14 years 2 months ago
Friends only: examining a privacy-enhancing behavior in facebook
Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study ...
Fred Stutzman, Jacob Kramer-Duffield