Sciweavers

556 search results - page 66 / 112
» Link Privacy in Social Networks
Sort
View
ICMCS
2007
IEEE
144views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Splog Detection using Content, Time and Link Structures
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms and splogs corrupt blog search results as well as waste netw...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
INFOCOM
2010
IEEE
13 years 7 months ago
Socially-Aware Network Design Games
—In many scenarios network design is not enforced by a central authority, but arises from the interactions of several self-interested agents. This is the case of the Internet, wh...
Jocelyne Elias, Fabio Martignon, Konstantin Avrach...
INFOCOM
2006
IEEE
14 years 2 months ago
Session Privacy Enhancement by Traffic Dispersion
— Traditional network routing uses the single (shortest) path paradigm. This paradigm leaves the session vulnerable to a variety of security threats, such as eavesdropping. We pr...
Haim Zlatokrilov, Hanoch Levy
CSCW
2006
ACM
14 years 2 months ago
A grounded theory of information sharing behavior in a personal learning space
This paper presents a grounded theory of information sharing behavior of the users of a personal learning space. A personal learning space is an environment consisted of weblog, e...
Maryam Najafian Razavi, Lee Iverson
ATAL
2003
Springer
14 years 2 months ago
Self-Organizing Referral Networks: A Process View of Trust and Authority
Abstract. We are developing a decentralized approach to trust based on referral systems, where agents adaptively give referrals to one another to find other trustworthy agents. In...
Pinar Yolum, Munindar P. Singh