Sciweavers

2491 search results - page 275 / 499
» Social Networking
Sort
View
137
Voted
CN
2011
129views more  CN 2011»
15 years 1 days ago
Decapitation of networks with and without weights and direction: The economics of iterated attack and defense
Vulnerability of networks against one-shot decapitation attacks has been addressed several times in the literature. A first study on how a network can best defend itself by reple...
Josep Domingo-Ferrer, Úrsula Gonzále...
189
Voted
HICSS
2000
IEEE
149views Biometrics» more  HICSS 2000»
15 years 9 months ago
Fugue: A Computer Mediated Conversational System that Supports Turn Negotiation
Computer mediated communication (CMC) systems are providing new ways to communicate. Yet many text-based CMC systems do not represent the invisible, interactive practices, such as...
Tara Rosenberger Shankar, Max VanKleek, Antonio Vi...
151
Voted
RECSYS
2010
ACM
15 years 5 months ago
Affiliation recommendation using auxiliary networks
Social network analysis has attracted increasing attention in recent years. In many social networks, besides friendship links amongst users, the phenomenon of users associating th...
Vishvas Vasuki, Nagarajan Natarajan, Zhengdong Lu,...
ICSE
2009
IEEE-ACM
16 years 5 months ago
Tesseract: Interactive visual exploration of socio-technical relationships in software development
Software developers have long known that project success requires a robust understanding of both technical and social linkages. However, research has largely considered these inde...
Anita Sarma, Larry Maccherone, Patrick Wagstrom, J...
IAT
2009
IEEE
15 years 11 months ago
Topology and Memory Effect on Convention Emergence
Abstract—Social conventions are useful self-sustaining protocols for groups to coordinate behavior without a centralized entity enforcing coordination. We perform an in-depth stu...
Daniel Villatoro, Sandip Sen, Jordi Sabater-Mir