Sciweavers

6696 search results - page 138 / 1340
» Securing social networks
Sort
View
SIGMOD
2009
ACM
149views Database» more  SIGMOD 2009»
14 years 10 months ago
CourseRank: a social system for course planning
Special-purpose social sites can offer valuable services to well-defined, closed, communities, e.g., in a university or in a corporation. The purpose of this demo is to show the c...
Benjamin Bercovitz, Filip Kaliszan, Georgia Koutri...
HICSS
2007
IEEE
102views Biometrics» more  HICSS 2007»
14 years 4 months ago
Social Facilitators and Inhibitors to Online Fluency
Studies of Internet use continue to show a gap between those with and without access to the Internet and its resources. However, recent work indicates that this is not a straightf...
Caroline Haythornthwaite
SOCIALCOM
2010
13 years 8 months ago
Detecting Social Situations from Interaction Geometry
A novel method for quantitatively measuring social interactions on small temporal and spatial scales on the basis of interaction geometry (reduced to the parameters interpersonal d...
Georg Groh, Alexander Lehmann, Jonas Reimers, Marc...
MOBIHOC
2001
ACM
14 years 10 months ago
The quest for security in mobile ad hoc networks
So far, research on mobile ad hoc networks has been focused primarily on routing issues. Security, on the other hand, has been given a lower priority. This paper provides an overv...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
WS
2005
ACM
14 years 3 months ago
The security of vehicular networks
Vehicular networks are likely to become the most relevant form of ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis ...
Jean-Pierre Hubaux