Sciweavers

6696 search results - page 174 / 1340
» Securing social networks
Sort
View
CEAS
2004
Springer
14 years 4 months ago
Extracting social networks and contact information from email and the Web
We present an end-to-end system that extracts a user’s social network and its members’ contact information given the user’s email inbox. The system identifies unique people...
Aron Culotta, Ron Bekkerman, Andrew McCallum
BCSHCI
2008
14 years 4 days ago
Strategies and struggles with privacy in an online social networking community
Online social networking communities such as Facebook and MySpace are extremely popular. These sites have changed how many people develop and maintain relationships through postin...
Katherine Strater, Heather Richter Lipford
CORR
2010
Springer
186views Education» more  CORR 2010»
13 years 10 months ago
Layered Label Propagation: A MultiResolution Coordinate-Free Ordering for Compressing Social Networks
We continue the line of research on graph compression started in [BV04], but we move our focus to the compression of social networks in a proper sense (e.g., LiveJournal): the app...
Paolo Boldi, Marco Rosa, Massimo Santini, Sebastia...
CSE
2009
IEEE
13 years 8 months ago
Edge Anonymity in Social Network Graphs
Edges in social network graphs can model sensitive relationships. In this paper, we consider the problem of edges anonymity in graphs. We propose a probabilistic notion of edge ano...
Lijie Zhang, Weining Zhang
GECCO
2011
Springer
346views Optimization» more  GECCO 2011»
13 years 2 months ago
Evolving relationships between social networks and stakeholder involvement in software projects
Software projects often fail because stakeholder communication and involvement are inadequate. This paper proposes a novel method to understand project social networks and their c...
Soo Ling Lim, Peter J. Bentley