Sciweavers

2492 search results - page 200 / 499
» False-Name-Proofness in Social Networks
Sort
View
ISAAC
2007
Springer
102views Algorithms» more  ISAAC 2007»
14 years 3 months ago
Depth of Field and Cautious-Greedy Routing in Social Networks
Social networks support efficient decentralized search: people can collectively construct short paths to a specified target in the network. Rank-based friendship—where the prob...
David Barbella, George Kachergis, David Liben-Nowe...
CSE
2009
IEEE
14 years 4 months ago
Structure of Neighborhoods in a Large Social Network
Abstract—We present here a method for analyzing the neighborhoods of all the vertices in a large graph. We first give an algorithm for characterizing a simple undirected graph t...
Alina Stoica, Christophe Prieur
CSE
2009
IEEE
14 years 4 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...
MHCI
2009
Springer
14 years 3 months ago
Context-Aware Mobile Media and Social Networks
Context-awareness is one of the rising trends of future mobile technology, and due to advances in technology development, new application and service concepts are being developed ...
Jonna Häkkilä, Albrecht Schmidt, Jani M&...
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
14 years 3 months ago
Redefining and Measuring Virtual Work in Teams: An Application of Social Network Analysis
For several decades organizational researchers have explored the practice of using electronic technology to communicate when team members work physically apart from each other. Ye...
Priscilla Arling