Sciweavers

48 search results - page 7 / 10
» Prying Data out of a Social Network
Sort
View
SDM
2010
SIAM
146views Data Mining» more  SDM 2010»
13 years 8 months ago
Towards Finding Valuable Topics
Enterprises depend on their information workers finding valuable information to be productive. However, existing enterprise search and recommendation systems can exploit few studi...
Zhen Wen, Ching-Yung Lin
HT
2009
ACM
14 years 1 months ago
Hyperincident connected components of tagging networks
Data created by social bookmarking systems can be described as 3-partite 3-uniform hypergraphs connecting documents, users, and tags (tagging networks), such that the toolbox of c...
Nicolas Neubauer, Klaus Obermayer
CIKM
2010
Springer
13 years 6 months ago
Fast and accurate estimation of shortest paths in large graphs
Computing shortest paths between two given nodes is a fundamental operation over graphs, but known to be nontrivial over large disk-resident instances of graph data. While a numbe...
Andrey Gubichev, Srikanta J. Bedathur, Stephan Seu...
INFOCOM
2010
IEEE
13 years 5 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes
HICSS
2005
IEEE
130views Biometrics» more  HICSS 2005»
14 years 1 months ago
Knowledge Flow in Interdisciplinary Teams
Knowledge flow in interdisciplinary teams has become of particular interest as research and alliances cross traditional disciplinary boundaries, and as computing is applied in any...
Caroline Haythornthwaite