Sciweavers

89 search results - page 11 / 18
» Randomizing Social Networks: a Spectrum Preserving Approach
Sort
View
JCM
2007
191views more  JCM 2007»
14 years 9 months ago
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions
— The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the physical layer. This approach addresses a uniq...
Xiaohua Li, Juite Hwu, E. Paul Ratazzi
GD
2009
Springer
15 years 25 days ago
More Flexible Radial Layout
We describe an algorithm for radial layout of undirected graphs, in which nodes are constrained to concentric circles centered at the origin. Such constraints are typical, e.g., i...
Ulrik Brandes, Christian Pich
WWW
2008
ACM
15 years 10 months ago
Trust-based recommendation systems: an axiomatic approach
High-quality, personalized recommendations are a key feature in many online systems. Since these systems often have explicit knowledge of social network structures, the recommenda...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
WWW
2009
ACM
15 years 10 months ago
What makes conversations interesting?: themes, participants and consequences of conversations in online social media
Rich media social networks promote not only creation and consumption of media, but also communication about the posted media item. What causes a conversation to be interesting, th...
Ajita John, Dorée D. Seligmann, Hari Sundar...
JSW
2007
106views more  JSW 2007»
14 years 9 months ago
Destabilization of Terrorist Networks through Argument Driven Hypothesis Model
— Social network analysis has been used for quite some time to analyze and understand the behavior of nodes in the network. Theses nodes could be individuals or group of persons,...
Dil Muhammad Akbar Hussain