Sciweavers

422 search results - page 52 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
ICDE
2009
IEEE
188views Database» more  ICDE 2009»
16 years 1 months ago
GuruMine: A Pattern Mining System for Discovering Leaders and Tribes
In this demo we introduce GuruMine, a pattern mining system for the discovery of leaders, i.e., influential users in social networks, and their tribes, i.e., a set of users usually...
Amit Goyal 0002, Byung-Won On, Francesco Bonchi, L...
JSW
2008
101views more  JSW 2008»
14 years 11 months ago
Implicit Authorization for Social Location Disclosure
Being increasingly equipped with highly-accurate positioning technologies, today's mobile phones enable their owners to transmit their current position over the cellular netwo...
Georg Treu, Florian Fuchs, Christiane Dargatz
INFOCOM
2010
IEEE
14 years 10 months ago
Multihop Transmission Opportunity in Wireless Multihop Networks
—Wireless multihop communication is becoming more important due to the increasing popularity of wireless sensor networks, wireless mesh networks, and mobile social networks. They...
Chansu Yu, Tianning Shen, Kang G. Shin, Jeong-Yoon...
WEBI
2007
Springer
15 years 6 months ago
Layers and Hierarchies in Real Virtual Networks
The virtual world is comprised of data items related to each other in a variety of contexts. Often such relations can be represented as graphs that evolve over time. Examples incl...
Olga Goussevskaia, Michael Kuhn 0002, Roger Watten...
CIG
2005
IEEE
15 years 5 months ago
Synchronous and Asynchronous Network Evolution in a Population of Stubborn Prisoners
— We study by computer simulation a population of individuals playing the prisoner’s dilemma game. Each player has an invariable strategy (cooperate or defect) but the network ...
Leslie Luthi, Mario Giacobini, Marco Tomassini