Sciweavers

7395 search results - page 51 / 1479
» Social Modeling and i*
Sort
View
ASWEC
2006
IEEE
15 years 4 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
ICWSM
2010
14 years 11 months ago
Sequential Influence Models in Social Networks
The spread of influence among individuals in a social network can be naturally modeled in a probabilistic framework, but it is challenging to reason about differences between vari...
Dan Cosley, Daniel P. Huttenlocher, Jon M. Kleinbe...
WEBDB
2005
Springer
158views Database» more  WEBDB 2005»
15 years 3 months ago
iFuice - Information Fusion utilizing Instance Correspondences and Peer Mappings
We present a new approach to information fusion of web data sources. It is based on peer-to-peer mappings between sources and utilizes correspondences between their instances. Suc...
Erhard Rahm, Andreas Thor, David Aumueller, Hong H...
UIC
2009
Springer
15 years 4 months ago
Mining and Visualizing Mobile Social Network Based on Bayesian Probabilistic Model
Social networking has provided powerful new ways to find people, organize groups, and share information. Recently, the potential functionalities of the ubiquitous infrastructure le...
Jun-Ki Min, Su-Hyung Jang, Sung-Bae Cho
CHI
2009
ACM
15 years 10 months ago
Can I borrow your phone?: understanding concerns when sharing mobile phones
Mobile phones are becoming increasingly personalized in terms of the data they store and the types of services they provide. At the same time, field studies have reported that the...
Amy K. Karlson, A. J. Bernheim Brush, Stuart E. Sc...