Sciweavers

422 search results - page 44 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
PERCOM
2011
ACM
14 years 3 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
ICETE
2004
253views Business» more  ICETE 2004»
15 years 1 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
HT
2010
ACM
15 years 5 months ago
Discovery of information disseminators and receptors on online social media
Today, there is significant sharing of information artifacts among users on various social media sites, including Digg, Twitter and Flickr. An interesting consequence of such ric...
Munmun De Choudhury
KDD
2005
ACM
140views Data Mining» more  KDD 2005»
16 years 7 days ago
Graphs over time: densification laws, shrinking diameters and possible explanations
How do real graphs evolve over time? What are "normal" growth patterns in social, technological, and information networks? Many studies have discovered patterns in stati...
Jure Leskovec, Jon M. Kleinberg, Christos Faloutso...
IGPL
2010
161views more  IGPL 2010»
14 years 10 months ago
Extending the Hegselmann-Krause Model I
Hegselmann and Krause have developed a simple yet powerful computational model for studying the opinion dynamics in societies of epistemically interacting truth-seeking agents. We...
Igor Douven, Alexander Riegler