Sciweavers

6696 search results - page 76 / 1340
» Securing social networks
Sort
View
KDD
2007
ACM
168views Data Mining» more  KDD 2007»
14 years 9 months ago
Finding tribes: identifying close-knit individuals from employment patterns
We present a family of algorithms to uncover tribes--groups of individuals who share unusual sequences of affiliations. While much work inferring community structure describes lar...
Lisa Friedland, David Jensen
ICMCS
2007
IEEE
156views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Exploiting Personal And Social Network Context For Event Annotation
This paper describes our framework to annotate events using personal and social network contexts. The problem is important as the correct context is critical to effective annotati...
Bageshree Shevade, Hari Sundaram, Lexing Xie
ASUNAM
2009
IEEE
14 years 2 months ago
Detecting Structural Changes and Command Hierarchies in Dynamic Social Networks
Community detection in social networks varying with time is a common yet challenging problem whereby efficient visualization of evolving relationships and implicit hierarchical s...
Romain Bourqui, Frédéric Gilbert, Pa...
SOCIALCOM
2010
13 years 6 months ago
Churn in Social Networks: A Discussion Boards Case Study
Churn has been identified as an important issue in a wide range of industries. In social networks, churn represents a significant risk for the health and functioning of communities...
Marcel Karnstedt, Tara Hennessy, Jeffrey Chan, Con...
IPTPS
2004
Springer
14 years 2 months ago
DHT Routing Using Social Links
— The equality and anonymity of peer-to-peer networks makes them vulnerable to routing denial of service attacks from misbehaving nodes. In this paper, we investigate how existin...
Sergio Marti, Prasanna Ganesan, Hector Garcia-Moli...