Sciweavers

2491 search results - page 395 / 499
» Social Networking
Sort
View
106
Voted
IEAAIE
2010
Springer
14 years 11 months ago
Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation
The ability for a user to accurately estimate the amount of trust to be placed in a peer user is gaining more and more attention in social network applications. Trust aggregation p...
Nele Verbiest, Chris Cornelis, Patricia Victor, En...
ISAAC
2010
Springer
226views Algorithms» more  ISAAC 2010»
14 years 11 months ago
On Tractable Cases of Target Set Selection
We study the NP-complete TARGET SET SELECTION (TSS) problem occurring in social network analysis. Complementing results on its approximability and extending results for its restric...
André Nichterlein, Rolf Niedermeier, Johann...
143
Voted
TKDE
2012
250views Formal Methods» more  TKDE 2012»
13 years 4 months ago
Dense Subgraph Extraction with Application to Community Detection
— This paper presents a method for identifying a set of dense subgraphs of a given sparse graph. Within the main applications of this “dense subgraph problem”, the dense subg...
Jie Chen 0007, Yousef Saad
IEPOL
2010
102views more  IEPOL 2010»
15 years 2 days ago
An antitrust analysis of the case for wireless network neutrality
The ongoing debate about possible implementation of regulatory rules requiring “network neutrality” for wireless telecommunications services is inherently about whether to imp...
Gregory L. Rosston, Michael D. Topper
PDC
2004
ACM
15 years 7 months ago
From small scale to large scale user participation: a case study of participatory design in e-government systems
Most experiments with participative design are with small scale, stand alone and not very strategic applications of ICT in organizations. However, modern ICT applications are incr...
Anne-Marie Oostveen, Peter Van den Besselaar