Sciweavers

2492 search results - page 25 / 499
» False-Name-Proofness in Social Networks
Sort
View
CCS
2010
ACM
13 years 6 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim
ISI
2008
Springer
13 years 7 months ago
A locality model of the evolution of blog networks
We present a model of evolution of large social networks. Our model is based on the local nature of communication: a node's communication energy is spend mostly within it'...
Mark K. Goldberg, Malik Magdon-Ismail, Stephen Kel...
ASUNAM
2011
IEEE
12 years 7 months ago
Is Objective Function the Silver Bullet? A Case Study of Community Detection Algorithms on Social Networks
Abstract—Community detection or cluster detection in networks is a well-studied, albeit hard, problem. Given the scale and complexity of modern day social networks, detecting “...
Yang Yang, Yizhou Sun, Saurav Pandit, Nitesh V. Ch...
CSE
2009
IEEE
13 years 11 months ago
Analyzing Enterprise Social Media Networks
Broadening adoption of social media applications within the enterprise offers a new and valuable data source for insight into the social structure of organizations. Social media ap...
Marc A. Smith, Derek L. Hansen, Eric Gleave
GECCO
2011
Springer
346views Optimization» more  GECCO 2011»
12 years 11 months ago
Evolving relationships between social networks and stakeholder involvement in software projects
Software projects often fail because stakeholder communication and involvement are inadequate. This paper proposes a novel method to understand project social networks and their c...
Soo Ling Lim, Peter J. Bentley