Sciweavers

2773 search results - page 8 / 555
» Decomposing Social Networks
Sort
View
PERCOM
2010
ACM
13 years 8 months ago
Privacy-enhanced social network routing in opportunistic networks
Opportunistic networking - forwarding messages in a disconnected mobile ad hoc network via any encountered nodes - otters a new mechanism for exploiting the mobile devices that man...
Iain Parris, Greg Bigwood, Tristan Henderson
HICSS
2009
IEEE
155views Biometrics» more  HICSS 2009»
14 years 4 months ago
Explaining the Continuous Use of Social Virtual Worlds: An Applied Theory of Planned Behavior Approach
Social virtual worlds (SVWs) have become increasingly popular spaces for social interaction. To be attractive to engage with, maintaining a sufficient base of active users is a si...
Jani Merikivi, Matti Mäntymäki
CHI
2003
ACM
14 years 10 months ago
Recommending collaboration with social networks: a comparative evaluation
Studies of information seeking and workplace collaboration often find that social relationships are a strong factor in determining who collaborates with whom. Social networks prov...
David W. McDonald
ICWSM
2008
13 years 11 months ago
Visualization of Social Interactions in Facebook
With the popularity of social networks such as Facebook, we have greatly extended our social interactions from the physical into the digital. With social networks we have an incre...
Takashi Okamoto, Kyle Buza
CANS
2009
Springer
169views Cryptology» more  CANS 2009»
14 years 4 months ago
Privacy-Preserving Relationship Path Discovery in Social Networks
As social networks sites continue to proliferate and are being used for an increasing variety of purposes, the privacy risks raised by the full access of social networking sites ov...
Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Pa...