Sciweavers

167 search results - page 16 / 34
» Operators for propagating trust and their evaluation in soci...
Sort
View
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
14 years 9 months ago
Mining social networks for personalized email prioritization
Email is one of the most prevalent communication tools today, and solving the email overload problem is pressingly urgent. A good way to alleviate email overload is to automatical...
Shinjae Yoo, Yiming Yang, Frank Lin, Il-Chul Moon
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 8 months ago
Influence and Passivity in Social Media
The ever-increasing amount of information flowing through Social Media forces the members of these networks to compete for attention and influence by relying on other people to sp...
Daniel M. Romero, Wojciech Galuba, Sitaram Asur, B...
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
14 years 2 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
SIGCOMM
2010
ACM
13 years 8 months ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
ICML
2009
IEEE
14 years 9 months ago
Learning spectral graph transformations for link prediction
We present a unified framework for learning link prediction and edge weight prediction functions in large networks, based on the transformation of a graph's algebraic spectru...
Andreas Lommatzsch, Jérôme Kunegis