Sciweavers

2492 search results - page 456 / 499
» False-Name-Proofness in Social Networks
Sort
View
SIGCSE
2010
ACM
183views Education» more  SIGCSE 2010»
14 years 4 months ago
Electronic commerce virtual laboratory
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
Joel Coffman, Alfred C. Weaver
HICSS
2008
IEEE
151views Biometrics» more  HICSS 2008»
14 years 4 months ago
Venice, California and World of Warcraft: Persistence and Ephemerality in Playful Spaces
Persistent digital media extend content beyond immediate ephemeral interactions and conversations. Systems such as email, instant messaging, digital kiosks, social networking site...
Silvia Lindtner, Bonnie A. Nardi
ICDM
2008
IEEE
230views Data Mining» more  ICDM 2008»
14 years 4 months ago
Evolutionary Clustering by Hierarchical Dirichlet Process with Hidden Markov State
This paper studies evolutionary clustering, which is a recently hot topic with many important applications, noticeably in social network analysis. In this paper, based on the rece...
Tianbing Xu, Zhongfei (Mark) Zhang, Philip S. Yu, ...
ICDM
2008
IEEE
222views Data Mining» more  ICDM 2008»
14 years 4 months ago
GRAPHITE: A Visual Query System for Large Graphs
We present Graphite, a system that allows the user to visually construct a query pattern, finds both its exact and approximate matching subgraphs in large attributed graphs, and ...
Duen Horng Chau, Christos Faloutsos, Hanghang Tong...
ISPAN
2008
IEEE
14 years 4 months ago
Product Line Sigraphs
Intuitively, a signed graph is a graph in which every edge is labeled with a + or − sign. For each edge, its sign represents the mode of the relationship between the vertices it...
Daniela Ferrero