Sciweavers

6696 search results - page 168 / 1340
» Securing social networks
Sort
View
SDM
2010
SIAM
153views Data Mining» more  SDM 2010»
14 years 2 days ago
Reconstruction from Randomized Graph via Low Rank Approximation
The privacy concerns associated with data analysis over social networks have spurred recent research on privacypreserving social network analysis, particularly on privacypreservin...
Leting Wu, Xiaowei Ying, Xintao Wu
WEBI
2010
Springer
13 years 8 months ago
Discovering Research Communities by Clustering Bibliographical Data
Today's world is characterized by the multiplicity of interconnections through many types of links between the people, that is why mining social networks appears to be an impo...
Fabrice Muhlenbach, Stéphane Lallich
LCN
1999
IEEE
14 years 2 months ago
An Integrated Software Immune System: A Framework for Automated Network Management, System Health, and Security
Maintaining the integrity of large-scale networks is becoming an increasingly daunting task as networks expand at an unprecedented rate. The majority of present network monitoring...
Michael Gilfix
IAT
2008
IEEE
14 years 5 months ago
Adapting to Changing Resource Requirements for Coalition Formation in Self-Organized Social Networks
Coalition formation in social networks, consisting of a graph of interdependent agents, allows many choices of which task to select and with whom to partner in the social network....
Levi Barton, Vicki H. Allan
CISS
2008
IEEE
13 years 10 months ago
Detection of anomalous meetings in a social network
Abstract-- When monitoring interactions within a social network, meetings or contacts between different members of the network are recorded. This paper addresses the problem of usi...
Jorge Silva, Rebecca Willett