Sciweavers

2492 search results - page 226 / 499
» False-Name-Proofness in Social Networks
Sort
View
IAT
2008
IEEE
14 years 4 months ago
PRIMO - Towards Privacy Aware Image Sharing
A growing number of users in Web 2.0 based social network sites and photo sharing portals upload millions of images per day. In many cases, this leads to serious privacy threats. ...
Thorben Burghardt, Andreas Walter, Erik Buchmann, ...
CSE
2009
IEEE
14 years 29 days ago
Where Information Searches for You: The Visible Past Ubiquitous Knowledge Environment for Digital Humanities
— Visible Past proposes a new class of interdisciplinary learning, documenting, knowledge production, and discovery experiences that are anchored in space and time indicators. Th...
Sorin Adam Matei, Eric A. Wernert, Travis Faas
HCI
2009
13 years 7 months ago
Modding as Rating Behavior in Virtual Communities: The Case of Rooster Teeth Productions
Virtual communities that make use of social network site features blend known applications of virtual communities. These communities can be simultaneously social and commercial, or...
Stefan Haefliger, Philip Reichen, Peter M. Jä...
CORR
2011
Springer
189views Education» more  CORR 2011»
13 years 4 months ago
Peer Effects and Stability in Matching Markets
Many-to-one matching markets exist in numerous different forms, such as college admissions, matching medical interns to hospitals for residencies, assigning housing to college st...
Elizabeth Bodine-Baron, Christina Lee, Anthony Cho...
CODASPY
2011
13 years 1 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong