Sciweavers

2678 search results - page 388 / 536
» Voting in social networks
Sort
View
CCR
2010
133views more  CCR 2010»
13 years 10 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
WWW
2009
ACM
14 years 11 months ago
sMash: semantic-based mashup navigation for data API network
With the proliferation of data APIs, it is not uncommon that users who have no clear ideas about data APIs will encounter difficulties to build Mashups to satisfy their requiremen...
Bin Lu, Zhaohui Wu, Yuan Ni, Guo Tong Xie, Chunyin...
WWW
2008
ACM
14 years 11 months ago
Topic modeling with network regularization
In this paper, we formally define the problem of topic modeling with network structure (TMN). We propose a novel solution to this problem, which regularizes a statistical topic mo...
Qiaozhu Mei, Deng Cai, Duo Zhang, ChengXiang Zhai
ICDCS
2009
IEEE
14 years 7 months ago
MOPS: Providing Content-Based Service in Disruption-Tolerant Networks
—Content-based service, which dynamically routes and delivers events from sources to interested users, is extremely important to network services. However, existing content-based...
Feng Li, Jie Wu
CSE
2009
IEEE
14 years 5 months ago
A Network-Aware Distributed Membership Protocol for Collaborative Defense
— To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly...
David Zage, Carl Livadas, Eve M. Schooler