Sciweavers

2492 search results - page 488 / 499
» False-Name-Proofness in Social Networks
Sort
View
AFRICACRYPT
2010
Springer
14 years 2 months ago
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys
Modern multi-user communication systems, including popular instant messaging tools, social network platforms, and cooperative-work applications, offer flexible forms of communica...
Michel Abdalla, Céline Chevalier, Mark Manu...
ICDM
2008
IEEE
141views Data Mining» more  ICDM 2008»
14 years 2 months ago
Scalable Tensor Decompositions for Multi-aspect Data Mining
Modern applications such as Internet traffic, telecommunication records, and large-scale social networks generate massive amounts of data with multiple aspects and high dimensiona...
Tamara G. Kolda, Jimeng Sun
ICC
2007
IEEE
193views Communications» more  ICC 2007»
14 years 2 months ago
A Semantic Context Model for Location-Based Cooperative Mobile Computing
—This paper addresses context issues in pervasive mobile computing and presents a semantic context model to support location based cooperative mobile applications. In this paper,...
Bin Hu, Philip Moore, Hsiai-Hwa Chen
IPPS
2007
IEEE
14 years 2 months ago
Software and Algorithms for Graph Queries on Multithreaded Architectures
Search-based graph queries, such as finding short paths and isomorphic subgraphs, are dominated by memory latency. If input graphs can be partitioned appropriately, large cluster...
Jonathan W. Berry, Bruce Hendrickson, Simon Kahan,...
AIRWEB
2007
Springer
14 years 1 months ago
Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms. The presence of splogs degrades blog search results as well...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...