Sciweavers

6696 search results - page 97 / 1340
» Securing social networks
Sort
View
SP
2002
IEEE
13 years 9 months ago
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks
Dawn Xiaodong Song, J. D. Tygar, David Zuckerman
CSE
2009
IEEE
14 years 1 months ago
Clustering Signature in Complex Social Networks
An important aspect in social computing is the structure of social networks, which build the underlying substrate for the exchange of information. With the growing importance of mi...
Ueli Peter, Tomas Hruz
CIKM
2008
Springer
14 years 2 days ago
Efficient sampling of information in social networks
As online social networking emerges, there has been increased interest to utilize the underlying social structure as well as the available social information to improve search. In...
Gautam Das, Nick Koudas, Manos Papagelis, Sushruth...
PERCOM
2010
ACM
13 years 8 months ago
Exploring quality in multisensor pervasive systems - a localization case study
This paper addresses quality vs. cost tradeoffs in multisensor pervasive spaces. Specifically, we focus on a case study that uses location sensing in instrumented pervasive spaces ...
Stefano Bonetti, Sharad Mehrotra, Nalini Venkatasu...
ASIASIM
2004
Springer
14 years 3 months ago
A Scalable, Ordered Scenario-Based Network Security Simulator
A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, netw...
Joo Beom Yun, Eung Ki Park, Eul-Gyu Im, Hoh Peter ...