Sciweavers

422 search results - page 61 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
DBKDA
2010
IEEE
127views Database» more  DBKDA 2010»
14 years 10 months ago
Failure-Tolerant Transaction Routing at Large Scale
—Emerging Web2.0 applications such as virtual worlds or social networking websites strongly differ from usual OLTP applications. First, the transactions are encapsulated in an AP...
Idrissa Sarr, Hubert Naacke, Stéphane Gan&c...
KDD
2012
ACM
200views Data Mining» more  KDD 2012»
13 years 2 months ago
Vertex neighborhoods, low conductance cuts, and good seeds for local community methods
The communities of a social network are sets of vertices with more connections inside the set than outside. We theoretically demonstrate that two commonly observed properties of s...
David F. Gleich, C. Seshadhri
COMSNETS
2012
182views more  COMSNETS 2012»
13 years 7 months ago
Hierarchy-aware distributed overlays in data centers using DC2
—Popular online services such as social networks, e-commerce and bidding are routinely hosted in large-scale data centers. Group communication systems (e.g., multicast) and distr...
Karthik Nagaraj, Hitesh Khandelwal, Charles Edwin ...
KIVS
2009
Springer
15 years 4 months ago
Banishing Patch-Cables from LAN Parties
Abstract. Although playing real-time multi-player games online over the Internet became more and more popular in the past few years, people still enjoy meeting for so-called “LAN...
Peter Baumung
SDM
2004
SIAM
229views Data Mining» more  SDM 2004»
15 years 1 months ago
R-MAT: A Recursive Model for Graph Mining
How does a `normal' computer (or social) network look like? How can we spot `abnormal' sub-networks in the Internet, or web graph? The answer to such questions is vital ...
Deepayan Chakrabarti, Yiping Zhan, Christos Falout...