Sciweavers

2678 search results - page 318 / 536
» Voting in social networks
Sort
View
PERCOM
2011
ACM
13 years 2 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
KDD
2007
ACM
139views Data Mining» more  KDD 2007»
14 years 11 months ago
Looking for Great Ideas: Analyzing the Innovation Jam
We discuss the Innovation Jam that IBM carried out in 2006, with the objective of identifying innovative and promising "Big Ideas" through a moderated on-line discussion...
Wojciech Gryc, Mary E. Helander, Richard D. Lawren...
FCT
2009
Springer
14 years 5 months ago
Computing Role Assignments of Chordal Graphs
In social network theory, a simple graph G is called k-role assignable if there is a surjective mapping that assigns a number from {1, . . . , k} called a role to each vertex of G ...
Pim van 't Hof, Daniël Paulusma, Johan M. M. ...
ICDM
2008
IEEE
118views Data Mining» more  ICDM 2008»
14 years 5 months ago
Dirichlet Process Based Evolutionary Clustering
Evolutionary Clustering has emerged as an important research topic in recent literature of data mining, and solutions to this problem have found a wide spectrum of applications, p...
Tianbing Xu, Zhongfei (Mark) Zhang, Philip S. Yu, ...
ISM
2008
IEEE
157views Multimedia» more  ISM 2008»
14 years 5 months ago
PhotoGeo: A Self-Organizing System for Personal Photo Collections
Nowadays the photo-capturing devices are no longer limited to digital cameras but include mobile phones, PDAs and others. This is leading to a new problem: a very large number of ...
Yuri Almeida Lacerda, Hugo Feitosa de Figueir&ecir...