Sciweavers

2492 search results - page 77 / 499
» False-Name-Proofness in Social Networks
Sort
View
AAAI
2010
13 years 9 months ago
Discovering Long Range Properties of Social Networks with Multi-Valued Time-Inhomogeneous Models
The current methods used to mine and analyze temporal social network data make two assumptions: all edges have the same strength, and all parameters are time-homogeneous. We show ...
Danny Wyatt, Tanzeem Choudhury, Jeff Bilmes
SOCIALCOM
2010
13 years 5 months ago
q-Anon: Rethinking Anonymity for Social Networks
This paper proposes that social network data should be assumed public but treated private. Assuming this rather confusing requirement means that anonymity models such as kanonymity...
Aaron Beach, Mike Gartrell, Richard Han
WWW
2008
ACM
14 years 8 months ago
Towards robust trust establishment in web-based social networks with socialtrust
We propose the SocialTrust framework for tamper-resilient trust establishment in online social networks. Two of the salient features of SocialTrust are its dynamic revision of tru...
James Caverlee, Ling Liu, Steve Webb
CSE
2009
IEEE
14 years 2 months ago
Inferring the Maximum Likelihood Hierarchy in Social Networks
—Individuals in social networks are often organized under some hierarchy such as a command structure. In many cases, when this structure is unknown, there is a need to discover h...
Arun S. Maiya, Tanya Y. Berger-Wolf
ETS
2000
IEEE
73views Hardware» more  ETS 2000»
13 years 7 months ago
Peer Feedback in Synchronous Writing Environments: A Case Study in French
This paper reports on a case study which investigates the interaction patterns among participants in a synchronous writing environment on a Local Area Network (LAN). The focus is ...
Trude Heift, Catherine Caws