Mining relational data often boils down to computing clusters, that is finding sub-communities of data elements forming cohesive sub-units, while being well separated from one an...
This paper presents the first mediated hierarchical identity-based encryption and signature schemes. Both schemes are designed to support information access control in hierarchical...
Through ethnographic research, we document the rise of personal social networks in the workplace, which we call intensional networks. Paradoxically, we find that the most fundament...
Bonnie A. Nardi, Steve Whittaker, Heinrich Schwarz
Abstract. A social networking service can become the basis for the information infrastructure of the future. For that purpose, it is important to extract social networks that refle...