Sciweavers

2492 search results - page 233 / 499
» False-Name-Proofness in Social Networks
Sort
View
ASUNAM
2010
IEEE
13 years 11 months ago
Rhythm and Randomness in Human Contact
There is substantial interest in the effect of human mobility patterns on opportunistic communications. Inspired by recent work revisiting some of the early evidence for a L
Mervyn P. Freeman, Nicholas W. Watkins, Eiko Yonek...
WS
2008
ACM
13 years 9 months ago
Using the Semantic Web for linking and reusing data across Web 2.0 communities
Large volumes of content (bookmarks, reviews, videos, etc.) are currently being created on the "Social Web", i.e. on Web 2.0 community sites, and this content is being a...
Uldis Bojars, John G. Breslin, Aidan Finn, Stefan ...
JDCTA
2010
130views more  JDCTA 2010»
13 years 4 months ago
A Search Algorithm for Clusters in a Network or Graph
A novel breadth-first based structural clustering method for graphs is proposed. Clustering is an important task for analyzing complex networks such as biological networks, World ...
Dongming Chen, Jing Wang, Xiaodong Chen, Xiaowei X...
WSDM
2010
ACM
227views Data Mining» more  WSDM 2010»
14 years 7 months ago
Folks in folksonomies: Social link prediction from shared metadata
Web 2.0 applications have attracted a considerable amount of attention because their open-ended nature allows users to create lightweight semantic scaffolding to organize and shar...
Rossano Schifanella, Alain Barrat, Ciro Cattuto, B...
ASUNAM
2010
IEEE
13 years 8 months ago
Mining Interaction Behaviors for Email Reply Order Prediction
—In email networks, user behaviors affect the way emails are sent and replied. While knowing these user behaviors can help to create more intelligent email services, there has no...
Byung-Won On, Ee-Peng Lim, Jing Jiang, Amruta Pura...