Sciweavers

556 search results - page 84 / 112
» Link Privacy in Social Networks
Sort
View
SP
2003
IEEE
14 years 2 months ago
Random Key Predistribution Schemes for Sensor Networks
Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because th...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
CORR
2008
Springer
174views Education» more  CORR 2008»
13 years 8 months ago
Bounded Budget Connection (BBC) Games or How to make friends and influence people, on a budget
Motivated by applications in social networks, peer-to-peer and overlay networks, we define and study the Bounded Budget Connection (BBC) game - we have a collection of n players o...
Nikolaos Laoutaris, Laura J. Poplawski, Rajmohan R...
KDD
2009
ACM
179views Data Mining» more  KDD 2009»
14 years 3 months ago
Identifying graphs from noisy and incomplete data
There is a growing wealth of data describing networks of various types, including social networks, physical networks such as transportation or communication networks, and biologic...
Galileo Mark S. Namata Jr., Lise Getoor
MOBISEC
2009
Springer
14 years 3 months ago
Filtering SPAM in P2PSIP Communities with Web of Trust
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasing...
Juho Heikkilä, Andrei Gurtov
APVIS
2006
13 years 10 months ago
Spatial analysis of centralization and decentralization in the population migration network
Although overcrowded and the depopulation of the population are one of the social issues in Japan, the complex mechanisms are not comprehended. Then, we tried to show this phenome...
S. Tomita, Y. Hayashi