Sciweavers

6696 search results - page 56 / 1340
» Securing social networks
Sort
View
WWW
2007
ACM
14 years 9 months ago
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography
In a social network, nodes correspond to people or other social entities, and edges correspond to social links between them. In an effort to preserve privacy, the practice of anon...
Lars Backstrom, Cynthia Dwork, Jon M. Kleinberg
GROUP
2005
ACM
14 years 2 months ago
Real-world oriented information sharing using social networks
While users disseminate various information in the open and widely distributed environment of the Semantic Web, determination of who shares access to particular information is at ...
Junichiro Mori, Tatsuhiko Sugiyama, Yutaka Matsuo
ICC
2009
IEEE
155views Communications» more  ICC 2009»
14 years 3 months ago
Modeling Random Walk Search Algorithms in Unstructured P2P Networks with Social Information
—Random walk (RW) has been widely used as a strategy for searching in peer-to-peer networks. The boom of social network applications introduces new impact to the classical algori...
Jing Xie, King-Shan Lui
ICASSP
2011
IEEE
13 years 18 days ago
Social norm based incentive mechanisms for peer-to-peer networks
In this paper, we build an analytical framework for the design and analysis of a new family of social norm based incentive mechanisms for peer-to-peer (P2P) networks. With this fr...
Yu Zhang, Jaeok Park, Mihaela van der Schaar
AGENTS
2000
Springer
14 years 15 days ago
Learning to Trust
Abstract. Evolutionary game-theory is a powerful tool to investigate the development of complex relations between individuals such as the emergence of cooperation and trust. But th...
Andreas Birk 0002