Sciweavers

6696 search results - page 117 / 1340
» Securing social networks
Sort
View
CIKM
2003
Springer
14 years 3 months ago
The link prediction problem for social networks
Given a snapshot of a social network, can we infer which new interactions among its members are likely to occur in the near future? We formalize this question as the link predicti...
David Liben-Nowell, Jon M. Kleinberg
PAISI
2007
Springer
14 years 4 months ago
Security Assessment for Application Network Services Using Fault Injection
Vulnerabilities in network protocol software have been problematic since Internet infrastructure was deployed. These vulnerabilities damage the reliability of network software and ...
Hyungwoo Kang, Dong Hoon Lee
SASN
2005
ACM
14 years 3 months ago
The security of vehicular ad hoc networks
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat an...
Maxim Raya, Jean-Pierre Hubaux
CSCW
1990
ACM
14 years 2 months ago
An Ethnographic Study of Distributed Problem Solving in Spreadsheet Development
In contrast to the common view of spreadsheetsas "single-user" programs, we have found that spreadsheetsoffer surprisingly strong support for cooperative development of ...
Bonnie A. Nardi, James R. Miller
CHI
2007
ACM
14 years 10 months ago
The impact of digital iconic realism on anonymous interactants' mobile phone communication
In this paper, I describe progress in research designed to explore the effect of the combination of behavioral and visual fidelity of avatars on users' social presence in syn...
Sin-Hwa Kang