Sciweavers

2492 search results - page 101 / 499
» False-Name-Proofness in Social Networks
Sort
View
HT
2009
ACM
14 years 2 months ago
Cross-tagging for personalized open social networking
The Social Web is successfully established and poised for continued growth. Web 2.0 applications such as blogs, bookmarking, music, photo and video sharing systems are among the m...
Avare Stewart, Ernesto Diaz-Aviles, Wolfgang Nejdl...
KES
2009
Springer
14 years 16 days ago
Virtual Communities of Practice's Purpose Evolution Analysis Using a Concept-Based Mining Approach
Today, social networks systems have become more and more important. People have change their way to relate and communicate. Therefore, how to enhance contents and organization of a...
Sebastián A. Ríos, Felipe Aguilera, ...
EUROISI
2008
13 years 9 months ago
An Information Theory Approach to Identify Sets of Key Players
This paper presents an application of information theory to identify sets of key players in social networks. First, we define two entropy measures that we use to analyze the struct...
Daniel Ortiz Arroyo, Dil Muhammad Akbar Hussain
ASUNAM
2009
IEEE
13 years 5 months ago
A Trustable Reputation Scheme Based on Private Relationships
Online reviews are widely used for purchase decisions. Their trustworthiness is limited, however, by fake reviews. Fortunately, opinions from friends in a social network are more ...
Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Ad...
AINA
2007
IEEE
14 years 2 months ago
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...