Sciweavers

316 search results - page 33 / 64
» Finding effectors in social networks
Sort
View
JUCS
2008
166views more  JUCS 2008»
13 years 10 months ago
Exposure and Support of Latent Social Networks among Learning Object Repository Users
Abstract: Although immense efforts have been invested in the construction of hundreds of learning object repositories, the degree of reuse of learning resources maintained in such ...
Peng Han, Gerd Kortemeyer, Bernd J. Krämer, C...
ASUNAM
2010
IEEE
14 years 7 days ago
Fast Discovery of Reliable Subnetworks
Abstract--We present a novel and efficient algorithm, PATH COVERING, for solving the most reliable subgraph problem. A reliable subgraph gives a concise summary of the connectivity...
Petteri Hintsanen, Hannu Toivonen, Petteri Sevon
SIN
2010
ACM
13 years 8 months ago
Analysis of privacy in online social networks of runet
In recent years, social networking sites (SNSs) gained high popularity among Internet users as they combine the best of both worlds: befriending people outside real life situation...
Slava Kisilevich, Florian Mansmann
CIKM
2008
Springer
14 years 20 days ago
Tag-geotag correlation in social networks
This paper presents an analysis of the correlation of annotated information unit (textual) tags and geographical identification metadata geotags. Despite the increased usage of ge...
Sang Su Lee, Dongwoo Won, Dennis McLeod
SIGCOMM
2010
ACM
13 years 11 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...