Sciweavers

6696 search results - page 114 / 1340
» Securing social networks
Sort
View
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
12 years 21 days ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
CSSW
2007
13 years 11 months ago
Weaving Space into the Web of Trust: An Asymmetric Spatial Trust Model for Social Networks
The proliferation of Geo-Information (GI) production in web-based collaboration environments such as mapping mashups built on top of mapping APIs such as GoogleMaps API poses new c...
Mohamed Bishr
TVCG
2012
169views Hardware» more  TVCG 2012»
12 years 21 days ago
Visual Reasoning about Social Networks Using Centrality Sensitivity
—In this paper, we study the sensitivity of centrality metrics as a key metric of social networks to support visual reasoning. As centrality represents the prestige or importance...
Carlos D. Correa, Tarik Crnovrsanin, Kwan-Liu Ma
HICSS
2009
IEEE
127views Biometrics» more  HICSS 2009»
14 years 5 months ago
A Conceptual and Operational Definition of 'Social Role' in Online Community
Both online and off, people frequently perform particular social roles. These roles organize behavior and give structure to positions in local networks. As more of social life bec...
Eric Gleave, Howard T. Welser, Thomas M. Lento, Ma...
CIA
2000
Springer
14 years 2 months ago
A Social Mechanism of Reputation Management in Electronic Communities
Abstract. Trust is important wherever agents must interact. We consider the important case of interactions in electronic communities, where the agents assist and represent principa...
Bin Yu, Munindar P. Singh