Sciweavers

6696 search results - page 135 / 1340
» Securing social networks
Sort
View
CSE
2009
IEEE
14 years 5 months ago
Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery
—The hidden knowledge in social networks data can be regarded as an important resource for criminal investigations which can help finding the structure and organization of a crim...
Amin Milani Fard, Martin Ester
JCDL
2009
ACM
134views Education» more  JCDL 2009»
14 years 4 months ago
What happens when facebook is gone?
Web users are spending more of their time and creative energies within online social networking systems. While many of these networks allow users to export their personal data or ...
Frank McCown, Michael L. Nelson
ACL
2010
13 years 8 months ago
Extracting Social Networks from Literary Fiction
We present a method for extracting social networks from literature, namely, nineteenth-century British novels and serials. We derive the networks from dialogue interactions, and t...
David K. Elson, Nicholas Dames, Kathleen McKeown
ASUNAM
2011
IEEE
12 years 10 months ago
Probabilistic Subgraph Matching on Huge Social Networks
—Users querying massive social networks or RDF databases are often not 100% certain about what they are looking for due to the complexity of the query or heterogeneity of the dat...
Matthias Bröcheler, Andrea Pugliese, V. S. Su...
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
14 years 2 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim