Sciweavers

2492 search results - page 87 / 499
» False-Name-Proofness in Social Networks
Sort
View
CHI
2010
ACM
14 years 7 days ago
Catalyzing social support for breast cancer patients
Social support is a critical, yet underutilized resource when undergoing cancer care. Underutilization occurs in two conditions: (a) when patients fail to seek out information, ma...
Meredith M. Skeels, Kenton T. Unruh, Christopher P...
CCS
2009
ACM
14 years 8 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao
ASUNAM
2011
IEEE
12 years 8 months ago
Locating Central Actors in Co-offending Networks
—A co-offending network is a network of offenders who have committed crimes together. Recently different researches have shown that there is a fairly strong concept of network am...
Mohammad A. Tayebi, Laurens Bakker, Uwe Gläss...
CSE
2009
IEEE
13 years 11 months ago
Social Networks' XSS Worms
— Online Social Networks are communities of people who share common interests. These types of networks are used by millions of people around the world. The massive adoption of th...
Mohammad Reza Faghani, Hossein Saidi
HICSS
2011
IEEE
335views Biometrics» more  HICSS 2011»
12 years 11 months ago
Cyberinfrastructure for Secondary Use of EHR Data: SSA's Use of the Nationwide Health Information Network
This study examined the use of the Nationwide Health Information Network as a cyberinfrastructure for secure and interoperable transport of existing clinical data from electronic ...
Sue S. Feldman, Thomas A. Horan