Sciweavers

23988 search results - page 140 / 4798
» Social Network Computing
Sort
View
ISI
2008
Springer
15 years 3 months ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang
CCS
2009
ACM
16 years 3 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao
PDC
2006
ACM
15 years 9 months ago
Oppositional and activist new media: remediation, reconfiguration, participation
Over the last decade, the major firms and cultural institutions that have dominated media and information industries in the U.S. and globally have been challenged by people adopti...
Leah A. Lievrouw
SACMAT
2011
ACM
14 years 6 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
IAT
2010
IEEE
15 years 1 months ago
Trustworthiness Tendency Incremental Extraction Using Information Gain
Computational trust systems are getting popular in several domains such as social networks, grid computing and business-to-business systems. However, the estimation of the trustwo...
Joana Urbano, Ana Paula Rocha, Eugenio Oliveira