Sciweavers

23988 search results - page 168 / 4798
» Social Network Computing
Sort
View
135
Voted
EUROISI
2008
15 years 5 months ago
An Information Theory Approach to Identify Sets of Key Players
This paper presents an application of information theory to identify sets of key players in social networks. First, we define two entropy measures that we use to analyze the struct...
Daniel Ortiz Arroyo, Dil Muhammad Akbar Hussain
ASUNAM
2009
IEEE
15 years 1 months ago
A Trustable Reputation Scheme Based on Private Relationships
Online reviews are widely used for purchase decisions. Their trustworthiness is limited, however, by fake reviews. Fortunately, opinions from friends in a social network are more ...
Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Ad...
CGA
2004
15 years 3 months ago
Browsers to Support Awareness and Social Interaction
feel abstract and informational rather than inviting for social interaction. Consequently, newcomers and occasional visitors to such sites cannot quickly assess who the participant...
Alison Lee, Andreas Girgensohn, Jun Zhang
108
Voted
KDD
2009
ACM
192views Data Mining» more  KDD 2009»
16 years 4 months ago
Co-evolution of social and affiliation networks
In our work, we address the problem of modeling social network generation which explains both link and group formation. Recent studies on social network evolution propose generati...
Elena Zheleva, Hossam Sharara, Lise Getoor
118
Voted
CHI
2011
ACM
14 years 7 months ago
Social and technical challenges in parenting teens' social media use
With millions of teenagers on the Internet, millions of parents are trying to understand what their teens are doing and why. Understanding how technology use impacts teens‘ lear...
Sarita Yardi, Amy Bruckman