Sciweavers

384 search results - page 66 / 77
» Measurement and analysis of online social networks
Sort
View
JDCTA
2010
150views more  JDCTA 2010»
13 years 5 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
PAKDD
2010
ACM
198views Data Mining» more  PAKDD 2010»
14 years 3 months ago
A Better Strategy of Discovering Link-Pattern Based Communities by Classical Clustering Methods
Abstract. The definition of a community in social networks varies with applications. To generalize different types of communities, the concept of linkpattern based community was pr...
Chen-Yi Lin, Jia-Ling Koh, Arbee L. P. Chen
CCS
2011
ACM
12 years 10 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
CORR
2011
Springer
217views Education» more  CORR 2011»
13 years 2 months ago
Coarse-Grained Topology Estimation via Graph Sampling
Many online networks are measured and studied via sampling techniques, which typically collect a relatively small fraction of nodes and their associated edges. Past work in this a...
Maciej Kurant, Minas Gjoka, Yan Wang, Zack W. Almq...
ECWEB
2010
Springer
219views ECommerce» more  ECWEB 2010»
13 years 12 months ago
Semantic Tag Cloud Generation via DBpedia
Abstract. Many current recommender systems exploit textual annotations (tags) provided by users to retrieve and suggest online contents. The text-based recommendation provided by t...
Roberto Mirizzi, Azzurra Ragone, Tommaso Di Noia, ...