Sciweavers

1368 search results - page 180 / 274
» Knowledge Management in Network Contexts
Sort
View
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
14 years 2 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
SIS
2008
13 years 10 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
KDD
2009
ACM
216views Data Mining» more  KDD 2009»
14 years 10 months ago
Finding a team of experts in social networks
Given a task T , a pool of individuals X with different skills, and a social network G that captures the compatibility among these individuals, we study the problem of finding X ,...
Theodoros Lappas, Kun Liu, Evimaria Terzi
DEXAW
2005
IEEE
140views Database» more  DEXAW 2005»
14 years 2 months ago
Effective Dynamic Replication in Wide-Area Network Environments: A Perspective
The unprecedented growth of data at geographically distributed locations coupled with tremendous improvement in networking capabilities over the last decade strongly motivate the ...
Anirban Mondal, Masaru Kitsuregawa
KDD
2010
ACM
244views Data Mining» more  KDD 2010»
13 years 7 months ago
Finding effectors in social networks
Assume a network (V, E) where a subset of the nodes in V are active. We consider the problem of selecting a set of k active nodes that best explain the observed activation state, ...
Theodoros Lappas, Evimaria Terzi, Dimitrios Gunopu...