Sciweavers

422 search results - page 32 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
INFOCOM
2009
IEEE
15 years 6 months ago
Delivery Properties of Human Social Networks
—The recently proposed Pocket Switched Network paradigm takes advantage of human social contacts to opportunistically create data paths over time. We examine how effective such a...
Nishanth Sastry, Karen R. Sollins, Jon Crowcroft
MSR
2006
ACM
15 years 5 months ago
Mining email social networks in Postgres
Open Source Software (OSS) projects provide a unique opportunity to gather and analyze publicly available historical data. The Postgres SQL server, for example, has over seven yea...
Christian Bird, Alex Gourley, Premkumar T. Devanbu...
ICASSP
2009
IEEE
15 years 3 months ago
Evolution of social P2P networks based on the dynamics of heterogeneous multimedia peers
In this paper, we consider social peer-to-peer (P2P) networks, where peers are sharing their resources (i.e., multimedia content and upload bandwidth). In the considered P2P netwo...
Hyunggon Park, Mihaela van der Schaar
CSE
2009
IEEE
15 years 6 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...
CEAS
2007
Springer
15 years 6 months ago
CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation
The growing popularity of IP telephony systems has made them attractive targets for spammers. Voice call spam, also known as Spam over Internet Telephony (SPIT), is potentially a ...
Vijay Balasubramaniyan, Mustaque Ahamad, Haesun Pa...