Sciweavers

422 search results - page 57 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
CEAS
2008
Springer
15 years 1 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
16 years 11 days ago
Constant-factor approximation algorithms for identifying dynamic communities
We propose two approximation algorithms for identifying communities in dynamic social networks. Communities are intuitively characterized as "unusually densely knit" sub...
Chayant Tantipathananandh, Tanya Y. Berger-Wolf
PERCOM
2007
ACM
15 years 11 months ago
A Simple Model and Infrastructure for Context-Aware Browsing of the World
The imminent mass deployment of pervasive computing technologies such as sensor networks and RFID tags, together with the increasing participation of the Web community in feeding ...
Gabriella Castelli, Alberto Rosi, Marco Mamei, Fra...
WINE
2005
Springer
107views Economy» more  WINE 2005»
15 years 5 months ago
Price of Anarchy of Network Routing Games with Incomplete Information
We consider a class of networks where n agents need to send their traffic from a given source to a given destination over m identical, non-intersecting, and parallel links. For suc...
Dinesh Garg, Yadati Narahari
WMI
2001
104views more  WMI 2001»
15 years 1 months ago
Pricing differentiated services in the GPRS environment
The General Packet Radio Service extends the existing GSM mobile communications technology by providing packet switching and higher data rates in order to efficiently access IPbas...
Sergios Soursos, Costas Courcoubetis, George C. Po...