Sciweavers

2492 search results - page 98 / 499
» False-Name-Proofness in Social Networks
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
Optimal Sybil-resilient node admission control
—Most existing large-scale networked systems on the Internet such as peer-to-peer systems are vulnerable to Sybil attacks where a single adversary can introduce many bogus identi...
Nguyen Tran, Jinyang Li, Lakshminarayanan Subraman...
ASUNAM
2011
IEEE
12 years 8 months ago
Visualizing Bibliographic Databases as Graphs and Mining Potential Research Synergies
—Bibliographic databases are a prosperous field for data mining research and social network analysis. They contain rich information, which can be analyzed across different dimen...
Iraklis Varlamis, George Tsatsaronis
ESWS
2009
Springer
14 years 2 months ago
Representing, Querying and Transforming Social Networks with RDF/SPARQL
As social networks are becoming ubiquitous on the Web, the Semantic Web goals indicate that it is critical to have a standard model allowing exchange, interoperability, transformat...
Mauro San Martín, Claudio Gutierrez
HICSS
2007
IEEE
105views Biometrics» more  HICSS 2007»
14 years 2 months ago
Leveraging Social Networks To Motivate Individuals to Reduce their Ecological Footprints
What role can social networking websites play in supporting large-scale group action and change? We are proposing to explore their use in supporting individual reduction in person...
Jennifer Mankoff, Deanna Matthews, Susan R. Fussel...
IV
2006
IEEE
190views Visualization» more  IV 2006»
14 years 1 months ago
Analyzing Actors and Their Discussion Topics by Semantic Social Network Analysis
iQuest is a novel software system to improve understanding of organizational phenomena with greater precision, clarity, and granularity than has previously been possible. It permi...
Peter A. Gloor, Yan Zhao