Sciweavers

227 search results - page 39 / 46
» Data and Structural k-Anonymity in Social Networks
Sort
View
KDD
2009
ACM
179views Data Mining» more  KDD 2009»
14 years 1 days ago
A viewpoint-based approach for interaction graph analysis
Recent innovations have resulted in a plethora of social applications on the Web, such as blogs, social networks, and community photo and video sharing applications. Such applicat...
Sitaram Asur, Srinivasan Parthasarathy
AAAI
2011
12 years 7 months ago
Relational Blocking for Causal Discovery
Blocking is a technique commonly used in manual statistical analysis to account for confounding variables. However, blocking is not currently used in automated learning algorithms...
Matthew J. Rattigan, Marc E. Maier, David Jensen
CSCW
2006
ACM
14 years 1 months ago
Improving network efficiency in real-time groupware with general message compression
Groupware communicates by sending messages across the network, and groupware programmers use a variety of formats for these messages, such as XML, plain text, or serialized object...
Carl Gutwin, Christopher Fedak, Mark Watson, Jeff ...
AIRWEB
2007
Springer
14 years 1 months ago
Computing Trusted Authority Scores in Peer-to-Peer Web Search Networks
Peer-to-peer (P2P) networks have received great attention for sharing and searching information in large user communities. The open and anonymous nature of P2P networks is one of ...
Josiane Xavier Parreira, Debora Donato, Carlos Cas...
WSC
2004
13 years 8 months ago
Data Farming Coevolutionary Dynamics in RePast
This paper describes the application of data farming techniques (Brandstein and Horne 1998) to explore various aspects of coevolutionary dynamics (McKelvey 2002) in organization s...
Brian F. Tivnan