Sciweavers

2492 search results - page 29 / 499
» False-Name-Proofness in Social Networks
Sort
View
HICSS
2011
IEEE
238views Biometrics» more  HICSS 2011»
12 years 11 months ago
Smoking Behavior and Friendship Formation: The Importance of Time Heterogeneity in Studying Social Network Dynamics
—This study illustrates the importance of assessing and accounting for time heterogeneity in longitudinal social network analysis. We apply the time heterogeneity model selection...
Joshua Alfred Lospinoso, Danielle J. Satchell
DBSEC
2011
233views Database» more  DBSEC 2011»
12 years 11 months ago
Multiparty Authorization Framework for Data Sharing in Online Social Networks
Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractiv...
Hongxin Hu, Gail-Joon Ahn
WWW
2009
ACM
12 years 3 months ago
The slashdot zoo: mining a social network with negative edges
We analyse the corpus of user relationships of the Slashdot technology news site. The data was collected from the Slashdot Zoo feature where users of the website can tag other user...
J. Kunegis, A. Lomatzsch, and C. Bauckhage
INFOCOM
2012
IEEE
11 years 10 months ago
MobiShare: Flexible privacy-preserving location sharing in mobile online social networks
—Location sharing is a fundamental component of mobile online social networks (mOSNs), which also raises significant privacy concerns. The mOSNs collect a large amount of locati...
Wei Wei, Fengyuan Xu, Qun Li
INFOCOM
2010
IEEE
13 years 5 months ago
Routing in Socially Selfish Delay Tolerant Networks
Abstract--Existing routing algorithms for Delay Tolerant Networks (DTNs) assume that nodes are willing to forward packets for others. In the real world, however, most people are so...
Qinghua Li, Sencun Zhu, Guohong Cao