Sciweavers

381 search results - page 36 / 77
» Private Relationships in Social Networks
Sort
View
SIGCOMM
2006
ACM
14 years 2 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...
SIGCOMM
2009
ACM
14 years 2 months ago
Opportunistic forwarding in workplaces
So far, the search for Opportunistic Network (ON) applications has focused on urban/rural scenarios where the combined use of mobility and the store-carry-and-forward paradigm hel...
Sabrina Gaito, Elena Pagani, Gian Paolo Rossi
CSE
2009
IEEE
14 years 2 months ago
First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL
—Social Network Analysis (SNA) has evolved as a popular, standard method for modeling meaningful, often hidden structural relationships in communities. Existing SNA tools often i...
Elizabeth M. Bonsignore, Cody Dunne, Dana Rotman, ...
ECSCW
2011
12 years 7 months ago
The Hugging Team: The Role of Technology in Business Networking Practices
Technological devices for social networking are produced in droves and networking through media seems to be the way of getting ahead in business. We examine what role technology pl...
Anne Thorsø Sørensen, Irina Shklovsk...
ICDM
2009
IEEE
167views Data Mining» more  ICDM 2009»
14 years 2 months ago
A Framework for Computing the Privacy Scores of Users in Online Social Networks
—A large body of work has been devoted to address corporate-scale privacy concerns related to social networks. The main focus was on how to share social networks owned by organiz...
Kun Liu, Evimaria Terzi