Sciweavers

4820 search results - page 46 / 964
» Clustering Social Networks
Sort
View
PERCOM
2010
ACM
15 years 2 months ago
Social-K: Real-time K-anonymity guarantees for social network applications
—Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of...
Aaron Beach, Mike Gartrell, Richard Han
CIKM
2010
Springer
15 years 2 months ago
Identifying hotspots on the real-time web
We study the problem of automatically identifying“hotspots” on the real-time web. Concretely, we propose to identify highly-dynamic ad-hoc collections of users – what we ref...
Krishna Yeswanth Kamath, James Caverlee
152
Voted
EDBT
2012
ACM
228views Database» more  EDBT 2012»
13 years 6 months ago
Finding maximal k-edge-connected subgraphs from a large graph
In this paper, we study how to find maximal k-edge-connected subgraphs from a large graph. k-edge-connected subgraphs can be used to capture closely related vertices, and findin...
Rui Zhou, Chengfei Liu, Jeffrey Xu Yu, Weifa Liang...
ITNG
2008
IEEE
15 years 10 months ago
Mobile Voice Access in Social Networking Systems
This paper presents a multimodal social networking system aimed at sharing geographic information among proximate users. The system provides users with a traditional web-based int...
Stan Kurkovsky, David Strimple, Eric Nuzzi, Kerry ...
CHI
2010
ACM
15 years 10 months ago
Social network activity and social well-being
Previous research has shown a relationship between use of social networking sites and feelings of social capital. However, most studies have relied on self-reports by college stud...
Moira Burke, Cameron Marlow, Thomas M. Lento