Sciweavers

833 search results - page 67 / 167
» Personalized social search based on the user's social networ...
Sort
View
ISCC
2008
IEEE
14 years 3 months ago
A sybilproof distributed identity management for P2P networks
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
François Lesueur, Ludovic Mé, Val&ea...
KDD
2005
ACM
181views Data Mining» more  KDD 2005»
14 years 9 months ago
Evaluating similarity measures: a large-scale study in the orkut social network
Online information services have grown too large for users to navigate without the help of automated tools such as collaborative filtering, which makes recommendations to users ba...
Ellen Spertus, Mehran Sahami, Orkut Buyukkokten
IJVR
2007
100views more  IJVR 2007»
13 years 9 months ago
The Impact of Social Interaction on Usability for Distributed Virtual Environments
—Distance collaboration has long been a research area for distributed Virtual Environments (VEs). In these environments people interact with the technology and each other in a co...
Ilona Heldal
KDD
2007
ACM
244views Data Mining» more  KDD 2007»
14 years 9 months ago
A Recommender System Based on Local Random Walks and Spectral Methods
In this paper, we design recommender systems for weblogs based on the link structure among them. We propose algorithms based on refined random walks and spectral methods. First, w...
Zeinab Abbassi, Vahab S. Mirrokni
SOUPS
2010
ACM
14 years 26 days ago
Feasibility of structural network clustering for group-based privacy control in social networks
Users of social networking sites often want to manage the sharing of information and content with different groups of people based on their differing relationships. However, group...
Simon Jones, Eamonn O'Neill