Sciweavers

521 search results - page 59 / 105
» Social Network Discovery Based on Sensitivity Analysis
Sort
View
WWW
2011
ACM
13 years 3 months ago
Truthy: mapping the spread of astroturf in microblog streams
Online social media are complementing and in some cases replacing person-to-person social interaction and redefining the diffusion of information. In particular, microblogs have ...
Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bru...
JSAI
2005
Springer
14 years 2 months ago
Network Topologies and Consumption Externalities
Abstract. The economic implications of network topologies are studied via a monopolist’s model of market networks originally proposed by Phan, et al. (2003). By embedding the mar...
Shu-Heng Chen, Li-Cheng Sun, Chih-Chien Wang
PREMI
2007
Springer
14 years 3 months ago
Discovery of Process Models from Data and Domain Knowledge: A Rough-Granular Approach
The rapid expansion of the Internet has resulted not only in the ever-growing amount of data stored therein, but also in the burgeoning complexity of the concepts and phenomena per...
Andrzej Skowron
TOCS
2008
107views more  TOCS 2008»
13 years 8 months ago
RaWMS - Random Walk Based Lightweight Membership Service for Wireless Ad Hoc Networks
RaWMS is a novel lightweight random membership service for ad hoc networks. The service provides each node with a partial uniformly chosen view of network nodes. Such a membership...
Ziv Bar-Yossef, Roy Friedman, Gabriel Kliot
IEEECIT
2010
IEEE
13 years 7 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi