Sciweavers

2492 search results - page 67 / 499
» False-Name-Proofness in Social Networks
Sort
View
HUC
2011
Springer
12 years 7 months ago
Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share
As ubiquitous computing becomes increasingly mobile and social, personal information sharing will likely increase in frequency, the variety of friends to share with, and range of ...
Jason Wiese, Patrick Gage Kelley, Lorrie Faith Cra...
ICSE
2012
IEEE-ACM
11 years 10 months ago
Continuous social screencasting to facilitate software tool discovery
—The wide variety of software development tools available today have a great potential to improve the way developers make software, but that potential goes unfulfilled when deve...
Emerson R. Murphy-Hill
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 2 months ago
A Complexity View of Markets with Social Influence
: In this paper, inspired by the work of Megiddo on the formation of preferences and strategic analysis, we consider an early market model studied in the field of economic theory, ...
Xi Chen, Shang-Hua Teng
PAMI
2012
11 years 10 months ago
Exploring Context and Content Links in Social Media: A Latent Space Method
—Social media networks contain both content and context-specific information. Most existing methods work with either of the two for the purpose of multimedia mining and retrieva...
Guo-Jun Qi, Charu C. Aggarwal, Qi Tian, Heng Ji, T...
ICWSM
2010
13 years 9 months ago
Comparing Information Diffusion Structure in Weblogs and Microblogs
To better understand and characterize the emerging social medium of microblogging we conducted a comparison between Twitter and a weblog network for their respective information d...
Jiang Yang, Scott Counts