Sciweavers

2678 search results - page 302 / 536
» Voting in social networks
Sort
View
151
Voted
SECPERU
2006
IEEE
15 years 6 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
89
Voted
HICSS
2005
IEEE
182views Biometrics» more  HICSS 2005»
15 years 6 months ago
How the Semantic Web is Being Used: An Analysis of FOAF Documents
— Semantic Web researchers have initially focused on the representation, development and use of ontologies but paid less attention to the social and structural relationships invo...
Li Ding, Lina Zhou, Timothy W. Finin, Anupam Joshi
84
Voted
AUSDM
2006
Springer
136views Data Mining» more  AUSDM 2006»
15 years 4 months ago
Data Mining in Conceptualising Active Ageing
The concept of older adults contributing to society in a meaningful way has been termed `active ageing'. We present applications of data mining techniques on the active agein...
Richi Nayak, Laurie Buys, Jan Lovie-Kitchin
103
Voted
DAGSTUHL
2007
15 years 2 months ago
Sensor Technologies for AL Systems Integrated Health Monitoring and Emergency Call System
Most developed countries are facing an ageing population, leading to an increasing demand on both health care and social welfare systems. There is a general agreement that these in...
Roc Berenguer
111
Voted
ICWSM
2010
14 years 11 months ago
Longevity in Second Life
User retention is important to the success of online social media, particularly in virtual world settings where users shape one another’s online experience. We study a rich set ...
ChunYuen Teng, Lada A. Adamic