Sciweavers

341 search results - page 59 / 69
» Leveraging social networks for information sharing
Sort
View
CCR
2010
133views more  CCR 2010»
13 years 8 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
AIRWEB
2007
Springer
14 years 2 months ago
Computing Trusted Authority Scores in Peer-to-Peer Web Search Networks
Peer-to-peer (P2P) networks have received great attention for sharing and searching information in large user communities. The open and anonymous nature of P2P networks is one of ...
Josiane Xavier Parreira, Debora Donato, Carlos Cas...
ACL
2012
11 years 10 months ago
Tweet Recommendation with Graph Co-Ranking
As one of the most popular micro-blogging services, Twitter attracts millions of users, producing millions of tweets daily. Shared information through this service spreads faster ...
Rui Yan, Mirella Lapata, Xiaoming Li
JSAC
2007
132views more  JSAC 2007»
13 years 7 months ago
Lifetime maximization via cooperative nodes and relay deployment in wireless networks
— Extending lifetime of battery-operated devices is a key design issue that allows uninterrupted information exchange among distributed nodes in wireless networks. Cooperative co...
Thanongsak Himsoon, W. Pam Siriwongpairat, Zhu Han...
WICSA
2008
13 years 9 months ago
Wishes and Boundaries for a Software Architecture Knowledge Community
Software architecting is a highly knowledge-intensive process demanding and producing a large and rich amount of information. To remain competitive, companies and organizations wo...
Patricia Lago, Paris Avgeriou, Rafael Capilla, Phi...