Sciweavers

521 search results - page 59 / 105
» Social Network Discovery Based on Sensitivity Analysis
Sort
View
WWW
2011
ACM
14 years 7 months ago
Truthy: mapping the spread of astroturf in microblog streams
Online social media are complementing and in some cases replacing person-to-person social interaction and redefining the diffusion of information. In particular, microblogs have ...
Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bru...
62
Voted
JSAI
2005
Springer
15 years 6 months ago
Network Topologies and Consumption Externalities
Abstract. The economic implications of network topologies are studied via a monopolist’s model of market networks originally proposed by Phan, et al. (2003). By embedding the mar...
Shu-Heng Chen, Li-Cheng Sun, Chih-Chien Wang
PREMI
2007
Springer
15 years 6 months ago
Discovery of Process Models from Data and Domain Knowledge: A Rough-Granular Approach
The rapid expansion of the Internet has resulted not only in the ever-growing amount of data stored therein, but also in the burgeoning complexity of the concepts and phenomena per...
Andrzej Skowron
TOCS
2008
107views more  TOCS 2008»
15 years 12 days ago
RaWMS - Random Walk Based Lightweight Membership Service for Wireless Ad Hoc Networks
RaWMS is a novel lightweight random membership service for ad hoc networks. The service provides each node with a partial uniformly chosen view of network nodes. Such a membership...
Ziv Bar-Yossef, Roy Friedman, Gabriel Kliot
109
Voted
IEEECIT
2010
IEEE
14 years 11 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi