Sciweavers

16 search results - page 1 / 4
» A Social Identity Approach to Identify Familiar Strangers in...
Sort
View
ICWSM
2009
13 years 4 months ago
A Social Identity Approach to Identify Familiar Strangers in a Social Network
We present a novel problem of searching for `familiar strangers' in a social network. Familiar strangers are individuals who are not directly connected but exhibit some simil...
Nitin Agarwal, Huan Liu, Sudheendra Murthy, Arunab...
GROUP
2007
ACM
13 years 10 months ago
Searching for experts in the enterprise: combining text and social network analysis
Employees depend on other people in the enterprise for rapid access to important information. But current systems for finding experts do not adequately address the social implicat...
Kate Ehrlich, Ching-Yung Lin, Vicky Griffiths-Fish...
DIM
2009
ACM
14 years 1 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
KDD
2009
ACM
179views Data Mining» more  KDD 2009»
14 years 1 months ago
Identifying graphs from noisy and incomplete data
There is a growing wealth of data describing networks of various types, including social networks, physical networks such as transportation or communication networks, and biologic...
Galileo Mark S. Namata Jr., Lise Getoor
MOBISYS
2007
ACM
14 years 6 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi