Sciweavers

1305 search results - page 109 / 261
» Inferring Privacy Information from Social Networks
Sort
View
TMC
2008
159views more  TMC 2008»
14 years 8 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
SUM
2010
Springer
14 years 8 months ago
Event Modelling and Reasoning with Uncertain Information for Distributed Sensor Networks
CCTV and sensor based surveillance systems are part of our daily lives now in this modern society due to the advances in telecommunications technology and the demand for better sec...
Jianbing Ma, Weiru Liu, Paul Miller
INFOCOM
2002
IEEE
15 years 2 months ago
Downlink Power Allocation for Multi-class CDMA Wireless Networks
Abstract—In this paper we consider the downlink power allocation problem for multi-class CDMA wireless networks. We use a utility based power allocation framework to treat multi-...
Jangwon Lee, Ravi Mazumdar, Ness B. Shroff
WAW
2004
Springer
178views Algorithms» more  WAW 2004»
15 years 3 months ago
Communities Detection in Large Networks
We develop an algorithm to detect community structure in complex networks. The algorithm is based on spectral methods and takes into account weights and links orientations. Since t...
Andrea Capocci, Vito Domenico Pietro Servedio, Gui...
CIKM
2011
Springer
13 years 10 months ago
Building directories for social tagging systems
Today, a number of algorithms exist for constructing tag hierarchies from social tagging data. While these algorithms were designed with ontological goals in mind, we know very li...
Denis Helic, Markus Strohmaier