Sciweavers

2678 search results - page 80 / 536
» Voting in social networks
Sort
View
WWW
2008
ACM
14 years 10 months ago
Extraction and mining of an academic social network
This paper addresses several key issues in extraction and mining of an academic social network: 1) extraction of a researcher social network from the existing Web; 2) integration ...
Jie Tang, Jing Zhang, Limin Yao, Juan-Zi Li
CCS
2009
ACM
14 years 4 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon
ISI
2007
Springer
14 years 4 months ago
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization
—A Weblog is a Web site where entries are made in diary style, maintained by its sole author – a blogger, and displayed in a reverse chronological order. Due to the freedom and...
Christopher C. Yang, Tobun D. Ng
CSCW
2004
ACM
14 years 3 months ago
Emergent networks, locus of control, and the pursuit of social capital
In this paper we examine the relationship between emergent social network characteristics in a computer-supported collaborative learning course and locus of control. An emergent c...
Michael Stefanone, Jeffrey T. Hancock, Geri Gay, A...
WASA
2009
Springer
186views Algorithms» more  WASA 2009»
14 years 2 months ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang