Sciweavers

2492 search results - page 194 / 499
» False-Name-Proofness in Social Networks
Sort
View
PAKDD
2009
ACM
134views Data Mining» more  PAKDD 2009»
14 years 6 months ago
On Link Privacy in Randomizing Social Networks.
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
ICIAP
2009
ACM
14 years 4 months ago
Re-photography and Environment Monitoring Using a Social Sensor Network
This paper presents a technology capable of enabling the creation of a diffuse, calibrated vision-sensor network from the wealth of socially generated geo-referenced imagery, freel...
Paul Chippendale, Michele Zanin, Claudio Andreatta
WEBI
2009
Springer
14 years 3 months ago
Monetizing User Activity on Social Networks - Challenges and Experiences
—This work summarizes challenges and experiences in monetizing user activity on public forums on social network sites. We present a approach that identifies the monetization pot...
Meenakshi Nagarajan, Kamal Baid, Amit P. Sheth, Sh...
ATAL
2009
Springer
14 years 3 months ago
Operators for propagating trust and their evaluation in social networks
Trust is a crucial basis for interactions among parties in large, open systems. Yet, the scale and dynamism of such systems make it infeasible for each party to have a direct basi...
Chung-Wei Hang, Yonghong Wang, Munindar P. Singh
COLCOM
2008
IEEE
14 years 3 months ago
Combining Social Networks and Semantic Web Technologies for Personalizing Web Access
Abstract. The original purpose of Web metadata was to protect endusers from possible harmful content and to simplify search and retrieval. However they can also be exploited in mor...
Barbara Carminati, Elena Ferrari, Andrea Perego