Sciweavers

2678 search results - page 291 / 536
» Voting in social networks
Sort
View
121
Voted
CEAS
2008
Springer
15 years 2 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao
KCAP
2005
ACM
15 years 6 months ago
Automated story capture from conversational speech
While storytelling has long been recognized as an important part of effective knowledge management in organizations, knowledge management technologies have generally not distingui...
Andrew S. Gordon, Kavita Ganesan
CHI
2008
ACM
16 years 1 months ago
Integrating statistics and visualization: case studies of gaining clarity during exploratory data analysis
Although both statistical methods and visualizations have been used by network analysts, exploratory data analysis remains a challenge. We propose that a tight integration of thes...
Adam Perer, Ben Shneiderman
92
Voted
RECSYS
2009
ACM
15 years 7 months ago
FriendSensing: recommending friends using mobile phones
We propose FriendSensing, a framework that automatically suggests friends to mobile social-networking users. Using short-range technologies (e.g., Bluetooth) on her mobile phone, ...
Daniele Quercia, Licia Capra
101
Voted
SBBD
2007
165views Database» more  SBBD 2007»
15 years 2 months ago
Peer-to-Peer Information Search
We consider the network structure and query processing capabilities of social communities like bookmarks and photo sharing communities such as del.icio.us or flickr. A common fea...
Sebastian Michel, Josiane Xavier Parreira