Sciweavers

2492 search results - page 86 / 499
» False-Name-Proofness in Social Networks
Sort
View
CIKM
2006
Springer
13 years 11 months ago
Topic evolution and social interactions: how authors effect research
We propose a method for discovering the dependency relationships between the topics of documents shared in social networks using the latent social interactions, attempting to answ...
Ding Zhou, Xiang Ji, Hongyuan Zha, C. Lee Giles
KDD
2010
ACM
214views Data Mining» more  KDD 2010»
13 years 11 months ago
Neighbor query friendly compression of social networks
Compressing social networks can substantially facilitate mining and advanced analysis of large social networks. Preferably, social networks should be compressed in a way that they...
Hossein Maserrat, Jian Pei
26
Voted
ISI
2008
Springer
13 years 8 months ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang
SOCROB
2010
120views Robotics» more  SOCROB 2010»
13 years 6 months ago
STB: Intentional Stance Grounded Child-Dependent Robot
This paper reports on a children-dependent robotic approach to establish asynchronous child assistance with a social rapport network for the purpose of collecting trash from a publ...
Yuto Yamaji, Taisuke Miyake, Yuta Yoshiike, P. Rav...
INFOCOM
2011
IEEE
12 years 11 months ago
STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs
—Receiver-location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable receiver’s location information ma...
Xiaodong Lin, Rongxing Lu, Xiaohui Liang, Xuemin S...