Sciweavers

6696 search results - page 147 / 1340
» Securing social networks
Sort
View
ALT
2008
Springer
14 years 7 months ago
Optimally Learning Social Networks with Activations and Suppressions
In this paper we consider the problem of learning hidden independent cascade social networks using exact value injection queries. These queries involve activating and suppressing a...
Dana Angluin, James Aspnes, Lev Reyzin
CSE
2009
IEEE
14 years 5 months ago
FaceCloak: An Architecture for User Privacy on Social Networking Sites
—Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, pri...
Wanying Luo, Qi Xie, Urs Hengartner
ICDM
2009
IEEE
167views Data Mining» more  ICDM 2009»
14 years 5 months ago
A Framework for Computing the Privacy Scores of Users in Online Social Networks
—A large body of work has been devoted to address corporate-scale privacy concerns related to social networks. The main focus was on how to share social networks owned by organiz...
Kun Liu, Evimaria Terzi
PERCOM
2010
ACM
13 years 8 months ago
Service-based development of mobile real-time collaboration applications for Social Networks
—Social Networks will unfold their full potential when connected people are enabled to collaborate - any time, appropriate to the current location, activity and computing environ...
Daniel Schuster, Thomas Springer, Alexander Schill
SOCIALCOM
2010
13 years 8 months ago
Building Mobile Social Network with Semantic Relation Using Bayesian NeTwork-based Life-log Mining
Mobile devices such as cell phone, PDA and smart phone have been so popularized that they are to be a necessity for everyday life. These mobile devices can be very useful tools to ...
Han-Saem Park, Sung-Bae Cho