Sciweavers

2492 search results - page 193 / 499
» False-Name-Proofness in Social Networks
Sort
View
ALT
2010
Springer
13 years 11 months ago
Inferring Social Networks from Outbreaks
We consider the problem of inferring the most likely social network given connectivity constraints imposed by observations of outbreaks within the network. Given a set of vertices ...
Dana Angluin, James Aspnes, Lev Reyzin
PSYCHNOLOGY
2006
103views more  PSYCHNOLOGY 2006»
13 years 9 months ago
The PASION Project: Psychologically Augmented Social Interaction Over Networks
Ever more frequently, social and particularly group interactions, involve mediated communication. Yet we know very little about the factors determining the effectiveness of the in...
Maria Cristina Brugnoli, Federico Morabito, Richar...
SIGCOMM
2006
ACM
14 years 3 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...
ICDCS
2010
IEEE
14 years 1 months ago
E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity
—Small talk is an important social lubricant that helps people, especially strangers, initiate conversations and make friends with each other in physical proximity. However, due ...
Zhimin Yang, Boying Zhang, Jiangpeng Dai, Adam C. ...
PET
2010
Springer
14 years 1 months ago
unFriendly: Multi-party Privacy Risks in Social Networks
Abstract. As the popularity of social networks expands, the information users expose to the public has potentially dangerous implications for individual privacy. While social netwo...
Kurt Thomas, Chris Grier, David M. Nicol