Sciweavers

2492 search results - page 163 / 499
» False-Name-Proofness in Social Networks
Sort
View
HICSS
2009
IEEE
104views Biometrics» more  HICSS 2009»
14 years 2 months ago
Multiple Social Networks Analysis of FLOSS Projects using Sargas
Due to their characteristics and claimed advantages, several researchers have been investigating free and open-source projects. Different aspects are being studied: for instance, ...
Samuel Felix de Sousa Jr., Marco Antonio Balieiro,...
INFOCOM
2009
IEEE
14 years 2 months ago
NetTube: Exploring Social Networks for Peer-to-Peer Short Video Sharing
—The recent three years have witnessed an explosion of networked video sharing, represented by YouTube, as a new killer Internet application. Their sustainable development howeve...
Xu Cheng, Jiangchuan Liu
AAAI
2010
13 years 9 months ago
The Genetic Algorithm as a General Diffusion Model for Social Networks
Diffusion processes taking place in social networks are used to model a number of phenomena, such as the spread of human or computer viruses, and the adoption of products in `vira...
Mayank Lahiri, Manuel Cebrián
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
14 years 9 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
CIKM
2009
Springer
14 years 2 months ago
Group CRM: a new telecom CRM framework from social network perspective
The structure of customer communication network provides us a natural way to understand customers’ relationships. Traditional customer relationship management (CRM) methods focu...
Bin Wu, Qi Ye, Shengqi Yang, Bai Wang