Sciweavers

2492 search results - page 105 / 499
» False-Name-Proofness in Social Networks
Sort
View
IPPS
2009
IEEE
14 years 2 months ago
Implementing and evaluating multithreaded triad census algorithms on the Cray XMT
Commonly represented as directed graphs, social networks depict relationships and behaviors among social entities such as people, groups, and organizations. Social network analysi...
George Chin Jr., Andrès Márquez, Sut...
IMC
2009
ACM
14 years 2 months ago
Understanding online social network usage from a network perspective
Online Social Networks (OSNs) have already attracted more than half a billion users. However, our understanding of which OSN features attract and keep the attention of these users...
Fabian Schneider, Anja Feldmann, Balachander Krish...
SOUPS
2010
ACM
13 years 12 months ago
Feasibility of structural network clustering for group-based privacy control in social networks
Users of social networking sites often want to manage the sharing of information and content with different groups of people based on their differing relationships. However, group...
Simon Jones, Eamonn O'Neill
INFOCOM
2009
IEEE
14 years 2 months ago
A Social Network Based Patching Scheme for Worm Containment in Cellular Networks
Abstract—Recently, cellular phone networks have begun allowing third-party applications to run over certain open-API phone operating systems such as Windows Mobile, Iphone and Go...
Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya ...
ICDM
2007
IEEE
166views Data Mining» more  ICDM 2007»
14 years 2 months ago
A Divisive Hierarchical Structural Clustering Algorithm for Networks
Many systems in sciences, engineering and nature can be modeled as networks. Examples are internet, metabolic networks and social networks. Network clustering algorithms aimed to ...
Nurcan Yuruk, Mutlu Mete, Xiaowei Xu, Thomas A. J....