Sciweavers

2492 search results - page 136 / 499
» False-Name-Proofness in Social Networks
Sort
View
ICDM
2009
IEEE
167views Data Mining» more  ICDM 2009»
14 years 2 months ago
A Framework for Computing the Privacy Scores of Users in Online Social Networks
—A large body of work has been devoted to address corporate-scale privacy concerns related to social networks. The main focus was on how to share social networks owned by organiz...
Kun Liu, Evimaria Terzi
SOCIALCOM
2010
13 years 6 months ago
Building Mobile Social Network with Semantic Relation Using Bayesian NeTwork-based Life-log Mining
Mobile devices such as cell phone, PDA and smart phone have been so popularized that they are to be a necessity for everyday life. These mobile devices can be very useful tools to ...
Han-Saem Park, Sung-Bae Cho
FIRSTMONDAY
2010
105views more  FIRSTMONDAY 2010»
13 years 5 months ago
A manifesto for modeling and measurement in social media
Online Social Networks (OSNs) have been the subject of a great deal of study in recent years. The majority of this study has used simple models, such as node-and-edge graphs, to d...
Graham Cormode, Balachander Krishnamurthy, Walter ...
WSDM
2010
ACM
254views Data Mining» more  WSDM 2010»
14 years 5 months ago
Learning Influence Probabilities In Social Networks
Recently, there has been tremendous interest in the phenomenon of influence propagation in social networks. The studies in this area assume they have as input to their problems a ...
Amit Goyal 0002, Francesco Bonchi, Laks V. S. Laks...
WWW
2009
ACM
14 years 8 months ago
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles
In order to address privacy concerns, many social media websites allow users to hide their personal profiles from the public. In this work, we show how an adversary can exploit an...
Elena Zheleva, Lise Getoor