Sciweavers

6696 search results - page 101 / 1340
» Securing social networks
Sort
View
SYNTHESE
2010
69views more  SYNTHESE 2010»
13 years 8 months ago
Social structure and the effects of conformity
Conformity is an often criticized feature of human belief formation. Although generally regarded as a negative influence on reliability, it has not been widely studied. This paper...
Kevin J. S. Zollman
MOBIHOC
2009
ACM
14 years 10 months ago
Multicasting in delay tolerant networks: a social network perspective
Node mobility and end-to-end disconnections in Delay Tolerant Networks (DTNs) greatly impair the effectiveness of data dissemination. Although social-based approaches can be used ...
Wei Gao, Qinghua Li, Bo Zhao, Guohong Cao
SIGCOMM
2009
ACM
14 years 4 months ago
On the evolution of user interaction in Facebook
Online social networks have become extremely popular; numerous sites allow users to interact and share content using social links. Users of these networks often establish hundreds...
Bimal Viswanath, Alan Mislove, Meeyoung Cha, P. Kr...
SOUPS
2005
ACM
14 years 3 months ago
Developing privacy guidelines for social location disclosure applications and services
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a ...
Giovanni Iachello, Ian E. Smith, Sunny Consolvo, M...
IMC
2009
ACM
14 years 4 months ago
Understanding online social network usage from a network perspective
Online Social Networks (OSNs) have already attracted more than half a billion users. However, our understanding of which OSN features attract and keep the attention of these users...
Fabian Schneider, Anja Feldmann, Balachander Krish...