Sciweavers

28 search results - page 4 / 6
» Evaluating the Use of Social Networks in Author Name Disambi...
Sort
View
DRM
2006
Springer
13 years 9 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
STOC
2012
ACM
256views Algorithms» more  STOC 2012»
11 years 8 months ago
Competitive contagion in networks
We develop a game-theoretic framework for the study of competition between firms who have budgets to “seed” the initial adoption of their products by consumers located in a s...
Sanjeev Goyal, Michael Kearns
CSCW
2002
ACM
13 years 5 months ago
On the recommending of citations for research papers
Collaborative filtering has proven to be valuable for recommending items in many different domains. In this paper, we explore the use of collaborative filtering to recommend resea...
Sean M. McNee, Istvan Albert, Dan Cosley, Prateep ...
WWW
2009
ACM
14 years 6 months ago
QuWi: quality control in Wikipedia
We propose and evaluate QuWi (Quality in Wikipedia), a framework for quality control in Wikipedia. We build upon a previous proposal by Mizzaro [11], who proposed a method for sub...
Alberto Cusinato, Vincenzo Della Mea, Francesco Di...
KDD
2009
ACM
227views Data Mining» more  KDD 2009»
14 years 6 months ago
User grouping behavior in online forums
Online forums represent one type of social media that is particularly rich for studying human behavior in information seeking and diffusing. The way users join communities is a re...
Xiaolin Shi, Jun Zhu, Rui Cai, Lei Zhang