Sciweavers

6696 search results - page 119 / 1340
» Securing social networks
Sort
View
CCS
2008
ACM
14 years 8 days ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
CMOT
1999
143views more  CMOT 1999»
13 years 10 months ago
Structural Learning: Attraction and Conformity in Task-Oriented Groups
This study extends previous research that showed how informal social sanctions can backfire when members prefer friendship over enforcement of group norms. We use a type of neural...
James A. Kitts, Michael W. Macy, Andreas Flache
PAKDD
2010
ACM
222views Data Mining» more  PAKDD 2010»
14 years 3 months ago
Online Sampling of High Centrality Individuals in Social Networks
In this work, we investigate the use of online or “crawling” algorithms to sample large social networks in order to determine the most influential or important individuals wit...
Arun S. Maiya, Tanya Y. Berger-Wolf
ICWSM
2010
13 years 11 months ago
Who Acquires Friends Through Social Media and Why? "Rich Get Richer" Versus "Seek and Ye Shall Find"
There is an ongoing debate, not just among academics but in popular culture, about whether social media can expand people's social networks, and whether online friends can be...
Zeynep Tufekci
KER
2008
193views more  KER 2008»
13 years 10 months ago
The 1st international workshop on computational social choice
Computational social choice is a new discipline currently emerging at the interface of social choice theory and computer science. It is concerned with the application of computati...
Ulle Endriss