Sciweavers

2540 search results - page 295 / 508
» Social Networks: An Introduction
Sort
View
PERCOM
2011
ACM
14 years 5 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
KDD
2007
ACM
139views Data Mining» more  KDD 2007»
16 years 2 months ago
Looking for Great Ideas: Analyzing the Innovation Jam
We discuss the Innovation Jam that IBM carried out in 2006, with the objective of identifying innovative and promising "Big Ideas" through a moderated on-line discussion...
Wojciech Gryc, Mary E. Helander, Richard D. Lawren...
ALT
2009
Springer
15 years 11 months ago
Learning Unknown Graphs
Motivated by a problem of targeted advertising in social networks, we introduce and study a new model of online learning on labeled graphs where the graph is initially unknown and...
Nicolò Cesa-Bianchi, Claudio Gentile, Fabio...
FCT
2009
Springer
15 years 8 months ago
Computing Role Assignments of Chordal Graphs
In social network theory, a simple graph G is called k-role assignable if there is a surjective mapping that assigns a number from {1, . . . , k} called a role to each vertex of G ...
Pim van 't Hof, Daniël Paulusma, Johan M. M. ...
ICDM
2008
IEEE
118views Data Mining» more  ICDM 2008»
15 years 8 months ago
Dirichlet Process Based Evolutionary Clustering
Evolutionary Clustering has emerged as an important research topic in recent literature of data mining, and solutions to this problem have found a wide spectrum of applications, p...
Tianbing Xu, Zhongfei (Mark) Zhang, Philip S. Yu, ...