Sciweavers

1728 search results - page 7 / 346
» Social Computing: Fundamentals and applications
Sort
View
PERCOM
2010
ACM
13 years 5 months ago
Social-K: Real-time K-anonymity guarantees for social network applications
—Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of...
Aaron Beach, Mike Gartrell, Richard Han
SIGECOM
2010
ACM
183views ECommerce» more  SIGECOM 2010»
14 years 8 days ago
The unavailable candidate model: a decision-theoretic view of social choice
One of the fundamental problems in the theory of social choice is aggregating the rankings of a set of agents (or voters) into a consensus ranking. Rank aggregation has found appl...
Tyler Lu, Craig Boutilier
CANDC
2009
ACM
13 years 11 months ago
Computational and cognitive infrastructures of stigma: empowering identity in social computing and gaming
Computing technologies such as games, social networking sites, and virtual environments often reproduce forms of social stigma encountered in everyday real life, as well as introd...
D. Fox Harrell
CSE
2009
IEEE
14 years 2 months ago
All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks
Recent research identifies a growing privacy problem that exists within Online Social Networks (OSNs). Several studies have shown how easily strangers can extract personal data a...
Lerone Banks, Shyhtsun Felix Wu
CIKM
2008
Springer
13 years 9 months ago
Social capital in online communities
Online communities are connecting hordes of individuals and generating rich social network data. The social capital that resides within these networks is largely unknown. We propo...
Matthew S. Smith