Sciweavers

2492 search results - page 224 / 499
» False-Name-Proofness in Social Networks
Sort
View
SIGCOMM
2010
ACM
13 years 10 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
AMT
2010
Springer
302views Multimedia» more  AMT 2010»
13 years 11 months ago
Social Relation Based Search Refinement: Let Your Friends Help You!
One of the major problems for search at Web scale is that the search results on the large scale data might be huge and the users have to browse to find the most relevant ones. Plus...
Xu Ren, Yi Zeng, Yulin Qin, Ning Zhong, Zhisheng H...
CSCW
2002
ACM
13 years 9 months ago
Using speakeasy for ad hoc peer-to-peer collaboration
Peer-to-peer systems appear promising in terms of their ability to support ad hoc, spontaneous collaboration. However, current peer-to-peer systems suffer from several deficiencie...
W. Keith Edwards, Mark W. Newman, Jana Z. Sedivy, ...
JUCS
2011
107views more  JUCS 2011»
13 years 16 days ago
Realising the Potential of Web 2.0 for Collaborative Learning Using Affordances
: With the emergence of the Web 2.0 phenomena, technology-assisted social networking has become the norm. The potential of social software for collaborative learning purposes is cl...
Andreas U. Kuswara, Debbie Richards
PODC
2010
ACM
13 years 11 months ago
Brief announcement: revisiting the power-law degree distribution for social graph analysis
The study of complex networks led to the belief that the connectivity of network nodes generally follows a Power-law distribution. In this work, we show that modeling large-scale ...
Alessandra Sala, Haitao Zheng, Ben Y. Zhao, Sabrin...