Sciweavers

422 search results - page 43 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
APVIS
2007
15 years 1 months ago
Visualization and analysis of email networks
This paper presents various methods for visualization and analysis of email networks; visualization on the surface of a sphere to reveal communication patterns between different g...
Xiaoyan Fu, Seok-Hee Hong, Nikola S. Nikolov, Xiao...
IDA
2009
Springer
14 years 9 months ago
Mining the Temporal Dimension of the Information Propagation
In the last decade, Social Network Analysis has been a field in which the effort devoted from several researchers in the Data Mining area has increased very fast. Among the possibl...
Michele Berlingerio, Michele Coscia, Fosca Giannot...
CSE
2009
IEEE
15 years 6 months ago
The Social Behaviors of Experts in Massive Multiplayer Online Role-Playing Games
— We examine the social behaviors of game experts in Everquest II, a popular massive multiplayer online role-playing game (MMO). We rely on Exponential Random Graph Models (ERGM)...
David Huffaker, Jing (Annie) Wang, Jeffrey William...
CSE
2009
IEEE
15 years 6 months ago
How Did You Get to Know That? A Traceable Word-of-Mouth Algorithm
Word-of-mouth communication has been shown to play a key role in a variety of environments such as viral marketing and virus spreading. A family of algorithms, generally known as ...
Manuel Cebrián, Enrique Frías-Mart&i...
CSE
2009
IEEE
15 years 6 months ago
Davis Social Links or: How I Learned to Stop Worrying and Love the Net
—When the Internet was conceived, its fundamental operation was envisioned to be point-to-point communication allowing anybody to talk directly to anybody. With its increasing su...
Matt Spear, Xiaoming Lu, Shyhtsun Felix Wu