Sciweavers

2491 search results - page 37 / 499
» Social Networking
Sort
View
IPTPS
2004
Springer
14 years 4 months ago
DHT Routing Using Social Links
— The equality and anonymity of peer-to-peer networks makes them vulnerable to routing denial of service attacks from misbehaving nodes. In this paper, we investigate how existin...
Sergio Marti, Prasanna Ganesan, Hector Garcia-Moli...
CSE
2009
IEEE
14 years 2 months ago
Social Networks' XSS Worms
— Online Social Networks are communities of people who share common interests. These types of networks are used by millions of people around the world. The massive adoption of th...
Mohammad Reza Faghani, Hossein Saidi
WASA
2009
Springer
141views Algorithms» more  WASA 2009»
14 years 5 months ago
Design and Implementation of Davis Social Links OSN Kernel
Social network popularity continues to rise as they broaden out to more users. Hidden away within these social networks is a valuable set of data that outlines everyone’s relatio...
Thomas Tran, Kelcey Chan, Shaozhi Ye, Prantik Bhat...
KDD
2008
ACM
135views Data Mining» more  KDD 2008»
14 years 11 months ago
Influence and correlation in social networks
Aris Anagnostopoulos, Ravi Kumar, Mohammad Mahdian
CASON
2009
IEEE
14 years 3 months ago
Social Influence Models Based on Starbucks Networks
Minkyoung Kim, Byoung-Tak Zhang, June-Sup Lee