Sciweavers

103 search results - page 15 / 21
» Abusing Social Networks for Automated User Profiling
Sort
View
PODC
2011
ACM
14 years 10 days ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
IMC
2010
ACM
14 years 7 months ago
Challenges in measuring online advertising systems
Online advertising supports many Internet services, such as search, email, and social networks. At the same time, there are widespread concerns about the privacy loss associated w...
Saikat Guha, Bin Cheng, Paul Francis
76
Voted
WASA
2009
Springer
186views Algorithms» more  WASA 2009»
15 years 2 months ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang
SIGIR
2011
ACM
14 years 10 days ago
Mining tags using social endorsement networks
Entities on social systems, such as users on Twitter, and images on Flickr, are at the core of many interesting applications: they can be ranked in search results, recommended to ...
Theodoros Lappas, Kunal Punera, Tamás Sarlo...
WWW
2008
ACM
14 years 9 months ago
Workshop on social web and knowledge management (SWKM2008)
This paper provides an overview on the synergies between social web and knowledge managemen, topics, program committee members as well as summary of accepted papers for the SWKM20...
Peter Dolog, Markus Krötzsch, Sebastian Schaf...