Most of the current swarm model studies and applications try to mimic the collective behaviors of social animals, such as birds and ants. The studies seek to solve tasks similar to...
Xiaohui Cui, Justin M. Beaver, Everett Stiles, Lau...
Much has been documented in the literature on sentiment analysis and document summarisation. Much of this applies to long structured text in the form of documents and blog posts. W...
William Simm, Maria Angela Ferrario, Scott Songlin...
Weblogs (blogs) serve as a gateway to a large blog reader population, so blog authors can potentially influence a large reader population by expressing their thoughts and expertise...
Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...
Abstract--In this paper, we propose a game-theoretic mechanism to encourage truthful data sharing for distributed data mining. Our proposed mechanism uses the classic VickreyClarke...
Inter-organizational networks often have multiple dimensions, each one denoting a type of relationship. In this research, we studied how one dimension of the network, a collaborati...
Kang Zhao, John Yen, Louis-Marie Ngamassi Tchouake...
Abstract--In both the commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information. In this paper we address the threat of infor...
Janusz Marecki, Mudhakar Srivatsa, Pradeep Varakan...
We explore the hypothesis that it is possible to obtain information about the dynamics of a blog network by analysing the temporal relationships between blogs at a semantic level, ...
-- Assessing the value of individual users' contributions in peer-production systems is paramount to the design of mechanisms that support collaboration and improve users'...
Elizeu Santos-Neto, Flavio Figueiredo, Jussara M. ...
Abstract--As the information flowing around in social networking systems is mainly related or can be attributed to their users, controlling access to such information by individual...