Sciweavers

2492 search results - page 234 / 499
» False-Name-Proofness in Social Networks
Sort
View
SAC
2011
ACM
13 years 15 days ago
Towards discovering criminal communities from textual data
In many criminal cases, forensically collected data contain valuable information about a suspect’s social networks. An investigator often has to manually extract information fro...
Rabeah Al-Zaidy, Benjamin C. M. Fung, Amr M. Youss...
CSCW
2012
ACM
12 years 5 months ago
Towards self-optimizing collaborative systems
Two important performance metrics in collaborative systems are local and remote response times. Previous analytical and simulation work has shown that these response times depend ...
Sasa Junuzovic, Prasun Dewan
INFOCOM
2012
IEEE
12 years 4 days ago
Sampling directed graphs with random walks
Abstract—Despite recent efforts to characterize complex networks such as citation graphs or online social networks (OSNs), little attention has been given to developing tools tha...
Bruno F. Ribeiro, Pinghui Wang, Fabricio Murai, Do...
MSR
2010
ACM
14 years 2 months ago
Validity of network analyses in Open Source Projects
—Social network methods are frequently used to analyze networks derived from Open Source Project communication and collaboration data. Such studies typically discover patterns in...
Roozbeh Nia, Christian Bird, Premkumar T. Devanbu,...
SDM
2009
SIAM
113views Data Mining» more  SDM 2009»
14 years 6 months ago
Graph Generation with Prescribed Feature Constraints.
In this paper, we study the problem of how to generate synthetic graphs matching various properties of a real social network with two applications, privacy preserving social netwo...
Xiaowei Ying, Xintao Wu