Sciweavers

422 search results - page 71 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
KDD
2009
ACM
179views Data Mining» more  KDD 2009»
15 years 4 months ago
A viewpoint-based approach for interaction graph analysis
Recent innovations have resulted in a plethora of social applications on the Web, such as blogs, social networks, and community photo and video sharing applications. Such applicat...
Sitaram Asur, Srinivasan Parthasarathy
PODS
2009
ACM
134views Database» more  PODS 2009»
16 years 10 days ago
Relationship privacy: output perturbation for queries with joins
We study privacy-preserving query answering over data containing relationships. A social network is a prime example of such data, where the nodes represent individuals and edges r...
Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Su...
AAAIDEA
2005
IEEE
15 years 5 months ago
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
Voice over IP (VoIP) and Instant Messaging (IM) systems to date have either followed a client-server model or have required the use of clients that do not follow any VoIP or IM st...
David A. Bryan, Bruce Lowekamp, Cullen Jennings
ACMDIS
2004
ACM
15 years 5 months ago
Jukola: democratic music choice in a public space
Jukola is an interactive MP3 Jukebox device designed to allow a group of people in a public space to democratically choose the music being played. A public display is used to nomi...
Kenton O'Hara, Matthew Lipson, Marcel Jansen, Axel...
PODC
2010
ACM
15 years 3 months ago
Brief announcement: improving social-network-based sybil-resilient node admission control
We present Gatekeeper, a decentralized protocol that performs Sybil-resilient node admission control based on a social network. Gatekeeper can admit most honest nodes while limiti...
Nguyen Tran, Jinyang Li, Lakshminarayanan Subraman...