Sciweavers

2492 search results - page 83 / 499
» False-Name-Proofness in Social Networks
Sort
View
WIMOB
2008
IEEE
14 years 2 months ago
Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments
— Mobile, delay-tolerant, ad hoc and pocket-switched networks may form an important part of future ubiquitous computing environments. Understanding how to efficiently and effect...
Greg Bigwood, D. Rehunathan, Martin Bateman, Trist...
ETS
2000
IEEE
220views Hardware» more  ETS 2000»
13 years 7 months ago
Law On-Line: A Collaborative, Web-Based Journey in the Law and Social Sciences
During Spring 1998, we embarked on pedagogical journey into unknown terrains -- the terrains of collaborative teaching and World Wide Web instruction. In this paper we present a j...
Cynthia L. Cates, Wayne V. McIntosh
ICALT
2010
IEEE
13 years 8 months ago
A Social Network Analysis Perspective on Student Interaction within the Twitter Microblogging Environment
— This paper summarises the analyses of participant interaction within the Twitter microblogging environment. The study employs longitudinal probabilistic social network analysis...
Karen Stepanyan, Kerstin Borau, Carsten Ullrich
SDM
2009
SIAM
208views Data Mining» more  SDM 2009»
14 years 5 months ago
A Bayesian Approach Toward Finding Communities and Their Evolutions in Dynamic Social Networks.
Although a large body of work are devoted to finding communities in static social networks, only a few studies examined the dynamics of communities in evolving social networks. I...
Tianbao Yang, Yun Chi, Shenghuo Zhu, Yihong Gong, ...
ASUNAM
2009
IEEE
14 years 2 months ago
Social Network Discovery Based on Sensitivity Analysis
—This paper presents a novel methodology for social network discovery based on the sensitivity coefficients of importance metrics, namely the Markov centrality of a node, a metr...
Tarik Crnovrsanin, Carlos D. Correa, Kwan-Liu Ma