Sciweavers

2492 search results - page 148 / 499
» False-Name-Proofness in Social Networks
Sort
View
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
13 years 12 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego
TVCG
2008
95views more  TVCG 2008»
13 years 8 months ago
Improving the Readability of Clustered Social Networks using Node Duplication
Exploring communities is an important task in social network analysis. Such communities are currently identified using clustering methods to group actors. This approach often leads...
Nathalie Henry, Anastasia Bezerianos, Jean-Daniel ...
ICALT
2003
IEEE
14 years 1 months ago
Cohesion and Roles: Network Analysis of CSCL Communities
We provide empirical support for the assertions that high level of knowledge construction is associated with structured design and that knowledge construction is associated with c...
Reuven Aviv, Zippy Erlich, Gilad Ravid
WWW
2009
ACM
14 years 8 months ago
Inferring private information using social network data
On-line social networks, such as Facebook, are increasingly utilized by many users. These networks allow people to publish details about themselves and connect to their friends. S...
Jack Lindamood, Raymond Heatherly, Murat Kantarcio...
CIKM
2009
Springer
14 years 2 months ago
Voting in social networks
A voting system is a set of rules that a community adopts to take collective decisions. In this paper we study voting systems for a particular kind of community: electronically me...
Paolo Boldi, Francesco Bonchi, Carlos Castillo, Se...