Sciweavers

SWAP
2007
13 years 5 months ago
Foaf-O-Matic - Solving the Identity Problem in the FOAF Network
An issue that is equally arising both from social networks and the Semantic Web is the fact that, without the consistent use of the same identifier for an object across systems, i...
Stefano Bortoli, Heiko Stoermer, Paolo Bouquet, Ho...
INTERACT
2003
13 years 5 months ago
DriftCatcher: The Implicit Social Context of Email
: This work uses Artificial Intelligence (AI) in an electronic communication interface to improve people’s ability to focus on important communications. Many social cues that all...
Andrea Lockerd, Ted Selker
SODA
2008
ACM
184views Algorithms» more  SODA 2008»
13 years 5 months ago
On the approximability of influence in social networks
In this paper, we study the spread of influence through a social network, in a model initially studied by Kempe, Kleinberg and Tardos [14, 15]: We are given a graph modeling a soc...
Ning Chen
PST
2008
13 years 5 months ago
An Access Control Scheme for Protecting Personal Data
This paper presents a new personal data access control (PDAC) scheme that is inspired by the protection schemes practiced in communities for sharing valuable commodities. The PDAC...
Wilfred Villegas, Bader Ali, Muthucumaru Maheswara...
INTERACT
2007
13 years 5 months ago
MatLink: Enhanced Matrix Visualization for Analyzing Social Networks
Abstract. Visualizing social networks presents challeges for both nodelink and adjacency matrix representations. Social networks are locally dense, which makes node-link displays u...
Nathalie Henry, Jean-Daniel Fekete
INTERACT
2007
13 years 5 months ago
Exploring Temporal Communication Through Social Networks
The dissemination of information in social networks and the relative effect of ICT (Information and Communications Technology) use has long been an interesting area of study in the...
Liaquat Hossain, Kon Shing Kenneth Chung, Shahriar...
ICWSM
2008
13 years 5 months ago
Thin Slices of Online Profile Attributes
People form consistent impressions of others given surprisingly little information. With the advent of social networks, impressions now may form online rather than in a face-to-fa...
Kristin Brooke Stecher, Scott Counts
SDM
2010
SIAM
153views Data Mining» more  SDM 2010»
13 years 5 months ago
Reconstruction from Randomized Graph via Low Rank Approximation
The privacy concerns associated with data analysis over social networks have spurred recent research on privacypreserving social network analysis, particularly on privacypreservin...
Leting Wu, Xiaowei Ying, Xintao Wu
SDM
2010
SIAM
146views Data Mining» more  SDM 2010»
13 years 5 months ago
Towards Finding Valuable Topics
Enterprises depend on their information workers finding valuable information to be productive. However, existing enterprise search and recommendation systems can exploit few studi...
Zhen Wen, Ching-Yung Lin
ICWSM
2010
13 years 5 months ago
Sequential Influence Models in Social Networks
The spread of influence among individuals in a social network can be naturally modeled in a probabilistic framework, but it is challenging to reason about differences between vari...
Dan Cosley, Daniel P. Huttenlocher, Jon M. Kleinbe...