Sciweavers

23988 search results - page 69 / 4798
» Social Network Computing
Sort
View
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
16 years 1 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
CIKM
2010
Springer
14 years 10 months ago
Mining interesting link formation rules in social networks
Link structures are important patterns one looks out for when modeling and analyzing social networks. In this paper, we propose the task of mining interesting Link Formation rules...
Cane Wing-ki Leung, Ee-Peng Lim, David Lo, Jianshu...
WPES
2005
ACM
15 years 5 months ago
Information revelation and privacy in online social networks
Participation in social networking sites has dramatically increased in recent years. Services such as Friendster, Tribe, or the Facebook allow millions of individuals to create on...
Ralph Gross, Alessandro Acquisti, H. John Heinz II...
INTERACT
2007
15 years 1 months ago
Cultural Mobilities: Diversity and Agency in Urban Computing
The rise of wireless networks and portable computing devices has been accompanied by an increasing interest in technology and mobility, and in the urban environment as a site of in...
Paul Dourish, Ken Anderson, Dawn Nafus
WSC
2008
15 years 2 months ago
Modeling and simulation of e-mail social networks: A new stochastic agent-based approach
Understanding how the structure of a network evolves over time is one of the most interesting and complex topics in the field of social networks. In our attempt to model the dynam...
Fabian Menges, Bud Mishra, Giuseppe Narzisi