Sciweavers

4820 search results - page 46 / 964
» Clustering Social Networks
Sort
View
PERCOM
2010
ACM
13 years 8 months ago
Social-K: Real-time K-anonymity guarantees for social network applications
—Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of...
Aaron Beach, Mike Gartrell, Richard Han
CIKM
2010
Springer
13 years 8 months ago
Identifying hotspots on the real-time web
We study the problem of automatically identifying“hotspots” on the real-time web. Concretely, we propose to identify highly-dynamic ad-hoc collections of users – what we ref...
Krishna Yeswanth Kamath, James Caverlee
EDBT
2012
ACM
228views Database» more  EDBT 2012»
12 years 9 days ago
Finding maximal k-edge-connected subgraphs from a large graph
In this paper, we study how to find maximal k-edge-connected subgraphs from a large graph. k-edge-connected subgraphs can be used to capture closely related vertices, and findin...
Rui Zhou, Chengfei Liu, Jeffrey Xu Yu, Weifa Liang...
ITNG
2008
IEEE
14 years 4 months ago
Mobile Voice Access in Social Networking Systems
This paper presents a multimodal social networking system aimed at sharing geographic information among proximate users. The system provides users with a traditional web-based int...
Stan Kurkovsky, David Strimple, Eric Nuzzi, Kerry ...
CHI
2010
ACM
14 years 4 months ago
Social network activity and social well-being
Previous research has shown a relationship between use of social networking sites and feelings of social capital. However, most studies have relied on self-reports by college stud...
Moira Burke, Cameron Marlow, Thomas M. Lento