This paper analyses the collaborative design of a high-technology product, a neuromagnetometer used in the analysis of the activity of the human cortex. The producer, Neuromag Com...
Recently, there has been tremendous interest in the phenomenon of influence propagation in social networks. The studies in this area assume they have as input to their problems a ...
Amit Goyal 0002, Francesco Bonchi, Laks V. S. Laks...
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
Mobile devices such as cell phone, PDA and smart phone have been so popularized that they are to be a necessity for everyday life. These mobile devices can be very useful tools to ...
Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study ...