Sciweavers

2678 search results - page 297 / 536
» Voting in social networks
Sort
View
81
Voted
ISI
2008
Springer
15 years 22 days ago
Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies
This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analy...
Nasrullah Memon, Henrik Legind Larsen, David L. Hi...
TSMC
2008
100views more  TSMC 2008»
15 years 18 days ago
Synchronization and State Estimation for Discrete-Time Complex Networks With Distributed Delays
Abstract--In this paper, a synchronization problem is investigated for an array of coupled complex discrete-time networks with the simultaneous presence of both the discrete and di...
Yurong Liu, Zidong Wang, Jinling Liang, Xiaohui Li...
102
Voted
AMI
2010
Springer
14 years 10 months ago
Dynamic Privacy Management in Pervasive Sensor Networks
This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our...
Nan-Wei Gong, Mathew Laibowitz, Joseph A. Paradiso
108
Voted
AINA
2009
IEEE
15 years 7 months ago
A SOA-Based Collaborative Environment for Clinical Trials on Neglected Diseases
—The WebInVivo project aims at providing automated support for clinical research on neglected diseases. It includes mechanisms for (a) sharing and reusing clinical trial assets, ...
Maria Beatriz Felgar de Toledo, Olga Nabuco, Marco...
IMC
2010
ACM
14 years 10 months ago
Challenges in measuring online advertising systems
Online advertising supports many Internet services, such as search, email, and social networks. At the same time, there are widespread concerns about the privacy loss associated w...
Saikat Guha, Bin Cheng, Paul Francis