Sciweavers

2492 search results - page 182 / 499
» False-Name-Proofness in Social Networks
Sort
View
JSAC
2007
155views more  JSAC 2007»
13 years 8 months ago
Semantic social overlay networks
— Peer selection for query routing is a core task in peer-to-peer networks. Unstructured peer-to-peer systems (like Gnutella) ignore this problem, leading to an abundance of netw...
Alexander Löser, Steffen Staab, Christoph Tem...
WWW
2010
ACM
14 years 3 months ago
Privacy wizards for social networking sites
Privacy is an enormous problem in online social networking sites. While sites such as Facebook allow users fine-grained control over who can see their profiles, it is difficult ...
Lujun Fang, Kristen LeFevre
MOBICOM
2005
ACM
14 years 1 months ago
PeopleNet: engineering a wireless virtual social network
People often seek information by asking other people even when they have access to vast reservoirs of information such as the Internet and libraries. This is because people are gr...
Mehul Motani, Vikram Srinivasan, Pavan Nuggehalli
ASUNAM
2010
IEEE
13 years 9 months ago
COSI: Cloud Oriented Subgraph Identification in Massive Social Networks
Subgraph matching is a key operation on graph data. Social network (SN) providers may want to find all subgraphs within their social network that "match" certain query gr...
Matthias Bröcheler, Andrea Pugliese, V. S. Su...
ASUNAM
2009
IEEE
13 years 6 months ago
Automatically Detecting Points of Interest and Social Networks from Tracking Positions of Avatars in a Virtual World
With hundreds of millions of users already today, virtual worlds will become an important factor in tomorrow's media landscape. In a virtual world, users are represented by s...
Frank Kappe, Bilal Zaka, Michael Steurer