Sciweavers

6696 search results - page 103 / 1340
» Securing social networks
Sort
View
DIM
2007
ACM
14 years 2 months ago
Using reputation to augment explicit authorization
Online social networks are formed when web applications allow users to contribute to an online community. The explosive growth of these social networks taxes the management capaci...
Phillip J. Windley, Devlin Daley, Bryant Cutler, K...
CIKM
2011
Springer
12 years 10 months ago
Structural link analysis and prediction in microblogs
With hundreds of millions of participants, social media services have become commonplace. Unlike a traditional social network service, a microblogging network like Twitter is a hy...
Dawei Yin, Liangjie Hong, Brian D. Davison
IPSN
2010
Springer
14 years 3 months ago
My Tai-Chi book: a virtual-physical social network platform
Fang-Jing Wu, Chen-Shao Huang, Yu-Chee Tseng
JNW
2006
117views more  JNW 2006»
13 years 10 months ago
An Obstacle Based Realistic Ad-Hoc Mobility Model for Social Networks
P. Venkateswaran, Rahul Ghosh, Aritra Das, S. K. S...
CONEXT
2010
ACM
13 years 8 months ago
Exploiting locality of interest in online social networks
Mike P. Wittie, Veljko Pejovic, Lara B. Deek, Kevi...