Sciweavers

23988 search results - page 194 / 4798
» Social Network Computing
Sort
View
EDBT
2010
ACM
180views Database» more  EDBT 2010»
15 years 7 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...
167
Voted
TKDE
2012
190views Formal Methods» more  TKDE 2012»
13 years 6 months ago
Scalable Learning of Collective Behavior
—This study of collective behavior is to understand how individuals behave in a social networking environment. Oceans of data generated by social media like Facebook, Twitter, Fl...
Lei Tang, Xufei Wang, Huan Liu
LCN
2007
IEEE
15 years 10 months ago
CAT: A Cost-Aware BitTorrent
— With an enhanced client computer performance and network bandwidth, peer-to-peer (P2P) content distribution networks are receiving much attention. However, along with the popul...
Shusuke Yamazaki, Hideki Tode, Koso Murakami
FC
2001
Springer
123views Cryptology» more  FC 2001»
15 years 8 months ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
153
Voted
CIKM
2010
Springer
15 years 2 months ago
Fast and accurate estimation of shortest paths in large graphs
Computing shortest paths between two given nodes is a fundamental operation over graphs, but known to be nontrivial over large disk-resident instances of graph data. While a numbe...
Andrey Gubichev, Srikanta J. Bedathur, Stephan Seu...