Sciweavers

274 search results - page 7 / 55
» Identifying sets of key players in a social network
Sort
View
SAC
2008
ACM
13 years 8 months ago
Whom should I trust?: the impact of key figures on cold start recommendations
Generating adequate recommendations for newcomers is a hard problem for a recommender system (RS) due to lack of detailed user profiles and social preference data. Empirical evide...
Patricia Victor, Chris Cornelis, Ankur Teredesai, ...
DEBU
2008
187views more  DEBU 2008»
13 years 8 months ago
Social SQL: Tools for Exploring Social Databases
Social media are constructed from the collective contributions of potentially millions of individuals and present an increasingly common and large scale form of database. As these...
Marc A. Smith, Vladimir Barash
DIMVA
2011
12 years 12 months ago
Reverse Social Engineering Attacks in Online Social Networks
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the second most visited site on the Internet, and has b...
Danesh Irani, Marco Balduzzi, Davide Balzarotti, E...
ASUNAM
2010
IEEE
13 years 10 months ago
Leveraging Contextual Information to Explore Posting and Linking Behaviors of Bloggers
The last decade has seen an explosion in blogging and the blogosphere is continuing to grow, having a large global reach and many vibrant communities. Researchers have been pouring...
Sofus A. Macskassy
AFRICACRYPT
2010
Springer
14 years 2 months ago
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys
Modern multi-user communication systems, including popular instant messaging tools, social network platforms, and cooperative-work applications, offer flexible forms of communica...
Michel Abdalla, Céline Chevalier, Mark Manu...