Sciweavers

2491 search results - page 256 / 499
» Social Networking
Sort
View
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
15 years 11 months ago
Profiles as Conversation: Networked Identity Performance on Friendster
Profiles have become a common mechanism for presenting one’s identity online. With the popularity of online social networking services such as Friendster.com, Profiles have been...
Danah Boyd, Jeffrey Heer
COLCOM
2005
IEEE
15 years 10 months ago
SLACER: randomness to cooperation in peer-to-peer networks
Peer-to-peer applications can benefit from human friendship networks (e.g., e-mail contacts or instant message buddy lists). However these are not always available. We propose an...
David Hales, Stefano Arteconi, Özalp Babaoglu
GLOBECOM
2010
IEEE
15 years 3 months ago
Trust Management for Encounter-Based Routing in Delay Tolerant Networks
: We propose and analyze a class of trust management protocols for encounter-based routing in delay tolerant networks (DTNs). The underlying idea is to incorporate trust evaluation...
Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee ...
ISI
2008
Springer
15 years 5 months ago
Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies
This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analy...
Nasrullah Memon, Henrik Legind Larsen, David L. Hi...
TSMC
2008
100views more  TSMC 2008»
15 years 5 months ago
Synchronization and State Estimation for Discrete-Time Complex Networks With Distributed Delays
Abstract--In this paper, a synchronization problem is investigated for an array of coupled complex discrete-time networks with the simultaneous presence of both the discrete and di...
Yurong Liu, Zidong Wang, Jinling Liang, Xiaohui Li...