Sciweavers

2492 search results - page 110 / 499
» False-Name-Proofness in Social Networks
Sort
View
AAAI
2012
11 years 10 months ago
Security Games for Controlling Contagion
Many strategic actions carry a ‘contagious’ component beyond the immediate locale of the effort itself. Viral marketing and peacekeeping operations have both been observed to ...
Jason Tsai, Thanh H. Nguyen, Milind Tambe
WWW
2010
ACM
14 years 3 months ago
Find me if you can: improving geographical prediction with social and spatial proximity
Geography and social relationships are inextricably intertwined; the people we interact with on a daily basis almost always live near us. As people spend more time online, data re...
Lars Backstrom, Eric Sun, Cameron Marlow
SIGMOD
2009
ACM
194views Database» more  SIGMOD 2009»
14 years 8 months ago
Building community-centric information exploration applications on social content sites
Social content sites [4], which integrate traditional content sites with social networking features, have recently emerged as an exciting new trend on the Web. Users on those site...
Sihem Amer-Yahia, Jian Huang, Cong Yu
ICWL
2009
Springer
14 years 2 months ago
Enhancing the Social Capital of Learning Communities by Using an Ad Hoc Transient Communities Service
In online learning, communities can help to enhance learning. However, because of the dynamic nature of communities, attaining and sustaining these communities can be difficult. On...
Sibren Fetter, Adriana J. Berlanga, Peter B. Sloep
CSCW
2004
ACM
14 years 1 months ago
Blogging as social activity, or, would you let 900 million people read your diary?
"Blogging" is a Web-based form of communication that is rapidly becoming mainstream. In this paper, we report the results of an ethnographic study of blogging, focusing ...
Bonnie A. Nardi, Diane J. Schiano, Michelle Gumbre...