Sciweavers

2492 search results - page 114 / 499
» False-Name-Proofness in Social Networks
Sort
View
SDM
2010
SIAM
115views Data Mining» more  SDM 2010»
13 years 9 months ago
Reconstructing Randomized Social Networks
In social networks, nodes correspond to entities and edges to links between them. In most of the cases, nodes are also associated with a set of features. Noise, missing values or ...
Niko Vuokko, Evimaria Terzi
CSSW
2007
13 years 9 months ago
Weaving Space into the Web of Trust: An Asymmetric Spatial Trust Model for Social Networks
The proliferation of Geo-Information (GI) production in web-based collaboration environments such as mapping mashups built on top of mapping APIs such as GoogleMaps API poses new c...
Mohamed Bishr
ISI
2006
Springer
13 years 8 months ago
Analyzing the Terrorist Social Networks with Visualization Tools
Analysis of terrorist social networks is essential for discovering knowledge about the structure of terrorist organizations. Such knowledge is important for developing effective co...
Christopher C. Yang, Nan Liu, Marc Sageman
EUROISI
2008
13 years 9 months ago
Locating Key Actors in Social Networks Using Bayes' Posterior Probability Framework
Abstract. Typical analytical measures in graph theory like degree centrality, betweenness and closeness centralities are very common and have long history of their successful use. ...
Dil Muhammad Akbar Hussain, Daniel Ortiz Arroyo
HICSS
2009
IEEE
127views Biometrics» more  HICSS 2009»
14 years 2 months ago
A Conceptual and Operational Definition of 'Social Role' in Online Community
Both online and off, people frequently perform particular social roles. These roles organize behavior and give structure to positions in local networks. As more of social life bec...
Eric Gleave, Howard T. Welser, Thomas M. Lento, Ma...