Sciweavers

2492 search results - page 459 / 499
» False-Name-Proofness in Social Networks
Sort
View
ICDM
2006
IEEE
147views Data Mining» more  ICDM 2006»
14 years 4 months ago
Adaptive Parallel Graph Mining for CMP Architectures
Mining graph data is an increasingly popular challenge, which has practical applications in many areas, including molecular substructure discovery, web link analysis, fraud detect...
Gregory Buehrer, Srinivasan Parthasarathy, Yen-Kua...
NSPW
2006
ACM
14 years 4 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
SIGECOM
2006
ACM
138views ECommerce» more  SIGECOM 2006»
14 years 4 months ago
Bid expressiveness and clearing algorithms in multiattribute double auctions
We investigate the space of two-sided multiattribute auctions, focusing on the relationship between constraints on the offers traders can express through bids, and the resulting c...
Yagil Engel, Michael P. Wellman, Kevin M. Lochner
SIGIR
2006
ACM
14 years 4 months ago
Contextual search and name disambiguation in email using graphs
Similarity measures for text have historically been an important tool for solving information retrieval problems. In many interesting settings, however, documents are often closel...
Einat Minkov, William W. Cohen, Andrew Y. Ng
HICSS
2005
IEEE
145views Biometrics» more  HICSS 2005»
14 years 3 months ago
Interoperability in E-Government: More than Just Smart Middleware
According to Layne and Lee (2001), electronic Government (e-Government, e-Gov) progresses towards higher levels of integration and interoperability among and between government le...
Hans Jochen Scholl