Sciweavers

650 search results - page 87 / 130
» Privacy in dynamic social networks
Sort
View
HT
2010
ACM
13 years 9 months ago
Capturing implicit user influence in online social sharing
Online social sharing sites are becoming very popular nowadays among Web users, who use these sites to share their favourite items and to discover interesting and useful items fro...
Ching-man Au Yeung, Tomoharu Iwata
DSRT
2009
IEEE
14 years 2 months ago
Human Flesh Search Model Incorporating Network Expansion and GOSSIP with Feedback
—With the development of on-line forum technology and the pervasive participation of the public, the Human Flesh Search is becoming an arising phenomenon which makes a great impa...
Bing Wang, Bonan Hou, Yiping Yao, Laibin Yan
ICC
2007
IEEE
115views Communications» more  ICC 2007»
14 years 1 months ago
Security Analysis of IEEE 802.16
— This paper analyzes some critical security issues in the family of IEEE 802.16 standard that has not been addressed so far. In particular two of the key features of the standar...
Leonardo Maccari, Matteo Paoli, Romano Fantacci
ARGMAS
2004
Springer
14 years 1 months ago
Specifying and Implementing a Persuasion Dialogue Game Using Commitments and Arguments
In this paper we propose a new persuasion dialogue game for agent communication. We show how this dialogue game is modeled by a framework based on social commitments and arguments....
Jamal Bentahar, Bernard Moulin, Brahim Chaib-draa
ICETE
2004
253views Business» more  ICETE 2004»
13 years 9 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong