Sciweavers

650 search results - page 119 / 130
» Privacy in dynamic social networks
Sort
View
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
12 years 11 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
ICMCS
2007
IEEE
144views Multimedia» more  ICMCS 2007»
14 years 1 months ago
Splog Detection using Content, Time and Link Structures
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms and splogs corrupt blog search results as well as waste netw...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
ICDM
2006
IEEE
147views Data Mining» more  ICDM 2006»
14 years 1 months ago
Adaptive Parallel Graph Mining for CMP Architectures
Mining graph data is an increasingly popular challenge, which has practical applications in many areas, including molecular substructure discovery, web link analysis, fraud detect...
Gregory Buehrer, Srinivasan Parthasarathy, Yen-Kua...
ELPUB
2008
ACM
13 years 9 months ago
African universities in the knowledge economy: a collaborative approach to researching and promoting open communications in high
This paper will describe the informal collaborative approach taken by a group of donor funders and researchers in southern and eastern Africa aimed at consolidating the results an...
Eve Gray, Mark Burke
KDD
2012
ACM
185views Data Mining» more  KDD 2012»
11 years 10 months ago
A framework for summarizing and analyzing twitter feeds
The firehose of data generated by users on social networking and microblogging sites such as Facebook and Twitter is enormous. Real-time analytics on such data is challenging wit...
Xintian Yang, Amol Ghoting, Yiye Ruan, Srinivasan ...