Sciweavers

2491 search results - page 37 / 499
» Social Networks
Sort
View
IPTPS
2004
Springer
15 years 3 months ago
DHT Routing Using Social Links
— The equality and anonymity of peer-to-peer networks makes them vulnerable to routing denial of service attacks from misbehaving nodes. In this paper, we investigate how existin...
Sergio Marti, Prasanna Ganesan, Hector Garcia-Moli...
CSE
2009
IEEE
15 years 29 days ago
Social Networks' XSS Worms
— Online Social Networks are communities of people who share common interests. These types of networks are used by millions of people around the world. The massive adoption of th...
Mohammad Reza Faghani, Hossein Saidi
WASA
2009
Springer
141views Algorithms» more  WASA 2009»
15 years 4 months ago
Design and Implementation of Davis Social Links OSN Kernel
Social network popularity continues to rise as they broaden out to more users. Hidden away within these social networks is a valuable set of data that outlines everyone’s relatio...
Thomas Tran, Kelcey Chan, Shaozhi Ye, Prantik Bhat...
59
Voted
KDD
2008
ACM
135views Data Mining» more  KDD 2008»
15 years 10 months ago
Influence and correlation in social networks
Aris Anagnostopoulos, Ravi Kumar, Mohammad Mahdian
69
Voted
CASON
2009
IEEE
15 years 2 months ago
Social Influence Models Based on Starbucks Networks
Minkyoung Kim, Byoung-Tak Zhang, June-Sup Lee