Sciweavers

7118 search results - page 1027 / 1424
» Electrical and Computer Engineering
Sort
View
CSE
2009
IEEE
15 years 11 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...
CSE
2009
IEEE
15 years 11 months ago
Collaborative Mining in Multiple Social Networks Data for Criminal Group Discovery
—The hidden knowledge in social networks data can be regarded as an important resource for criminal investigations which can help finding the structure and organization of a crim...
Amin Milani Fard, Martin Ester
CSE
2009
IEEE
15 years 11 months ago
Information Flow and Search in Unstructured Keyword Based Social Networks
—In online social networks (OSNs), user connections can be represented as a network. The network formed has distinct properties that distinguish it from other network topologies....
Ankush Garg, Prantik Bhattacharyya, Charles U. Mar...
CSE
2009
IEEE
15 years 11 months ago
The Formation of Task-Oriented Groups: Exploring Combat Activities in Online Games
— Advanced communication technologies enable strangers to work together on the same tasks or projects in virtual environments. Understanding the formation of taskoriented groups ...
Yun Huang, Mengxiao Zhu, Jing Wang, Nishith Pathak...
CSE
2009
IEEE
15 years 11 months ago
How Did You Get to Know That? A Traceable Word-of-Mouth Algorithm
Word-of-mouth communication has been shown to play a key role in a variety of environments such as viral marketing and virus spreading. A family of algorithms, generally known as ...
Manuel Cebrián, Enrique Frías-Mart&i...
« Prev « First page 1027 / 1424 Last » Next »