Sciweavers

6696 search results - page 74 / 1340
» Securing social networks
Sort
View
IMC
2009
ACM
14 years 3 months ago
Characterizing user behavior in online social networks
Understanding how users behave when they connect to social networking sites creates opportunities for better interface design, richer studies of social interactions, and improved ...
Fabrício Benevenuto, Tiago Rodrigues, Meeyo...
CONEXT
2008
ACM
13 years 10 months ago
Social DTN routing
Delay-tolerant network architectures exploit mobile devices carried by users to enable new networked applications. Efficiently routing information through these DTNs faces new cha...
Greg Bigwood, Tristan Henderson
WIMOB
2008
IEEE
14 years 3 months ago
Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments
— Mobile, delay-tolerant, ad hoc and pocket-switched networks may form an important part of future ubiquitous computing environments. Understanding how to efficiently and effect...
Greg Bigwood, D. Rehunathan, Martin Bateman, Trist...
PROCEDIA
2010
114views more  PROCEDIA 2010»
13 years 7 months ago
Small world models for social network algorithms testing
Social networks have small-world property, hierarchical community structure, and some other properties. This paper proposes models of networks with these properties and algorithm ...
Igor Kanovsky
ICALT
2010
IEEE
13 years 9 months ago
A Social Network Analysis Perspective on Student Interaction within the Twitter Microblogging Environment
— This paper summarises the analyses of participant interaction within the Twitter microblogging environment. The study employs longitudinal probabilistic social network analysis...
Karen Stepanyan, Kerstin Borau, Carsten Ullrich