Sciweavers

422 search results - page 46 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
IJMC
2010
139views more  IJMC 2010»
14 years 10 months ago
A realistic mobility model for wireless networks of scale-free node connectivity
: Recently, researchers have discovered that many of social, natural and biological networks are characterized by scale-free powerlaw connectivity distribution and a few densely po...
Sunho Lim, Chansu Yu, Chita R. Das
IMC
2009
ACM
15 years 6 months ago
Network level footprints of facebook applications
With over half a billion users, Online Social Networks (OSNs) are the major new applications on the Internet. Little information is available on the network impact of OSNs, althou...
Atif Nazir, Saqib Raza, Dhruv Gupta, Chen-Nee Chua...
NDSS
2008
IEEE
15 years 6 months ago
Halo: High-Assurance Locate for Distributed Hash Tables
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
Apu Kapadia, Nikos Triandopoulos
P2P
2007
IEEE
117views Communications» more  P2P 2007»
15 years 6 months ago
Peer-to-Peer Rating
This paper proposes to utilize algorithms from the probabilistic graphical models domain for Peer-to-Peer rating of data items and for computing “social influence” of nodes i...
Danny Bickson, Dahlia Malkhi, Lidong Zhou
MM
2005
ACM
126views Multimedia» more  MM 2005»
15 years 5 months ago
Facilitating collective musical creativity
We present two projects that facilitate collective music creativity over networks. One system is a participative social music system on mobile devices. The other is a collaborativ...
Atau Tanaka, Nao Tokui, Ali Momeni