Sciweavers

2492 search results - page 58 / 499
» False-Name-Proofness in Social Networks
Sort
View
TMC
2012
11 years 10 months ago
Mobile Data Offloading through Opportunistic Communications and Social Participation
—3G networks are currently overloaded, due to the increasing popularity of various applications for smartphones. Offloading mobile data traffic through opportunistic communicatio...
Bo Han, Pan Hui, V. S. Anil Kumar, Madhav V. Marat...
ICASSP
2009
IEEE
13 years 11 months ago
Summarization of large scale social network activity
This paper presents a novel social media summarization framework. Summarizing media created and shared in large scale online social networks unfolds challenging research problems....
Yu-Ru Lin, Hari Sundaram, Aisling Kelliher
CSCW
2004
ACM
13 years 11 months ago
Leveraging social networks for information sharing
Saori is a computation infrastructure that enables users and enduser applications to leverage social networks to mediate information dissemination. Saori provides users with aware...
Jeremy Goecks, Elizabeth D. Mynatt
CORR
2008
Springer
142views Education» more  CORR 2008»
13 years 8 months ago
Social networks that matter: Twitter under the microscope
Scholars, advertisers and political activists see massive online social networks as a representation of social interactions that can be used to study the propagation of ideas, soc...
Bernardo A. Huberman, Daniel M. Romero, Fang Wu
IJFIPM
2008
156views more  IJFIPM 2008»
13 years 7 months ago
Dynamic intimate contact social networks and epidemic interventions
Abstract: Sexually transmitted diseases and infections are, by definition, transferred among intimate social settings. Although the circumstances under which these social settings ...
Courtney Corley, Armin R. Mikler, Diane J. Cook, K...