Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
When an agent resides in a community, the opinion of other community members concerning whether a particular individual is trustworthy or not influences the trust level of this ag...
—We introduce a new data set which contains both a self-declared friendship network and self-chosen attributes from a finite list defined by the social networking site. We prop...
Abstract— In developing regions, Internet connectivity is extremely poor, while mobile phone penetration is much higher. The inhabitants of developing conuntries still rely on tr...
Efficient design of social networking applications must take account of two guiding principles: the adaptive processes by which humans learn and spread new information, and the co...
Ali Saidi, Mahesh V. Tripunitara, Mojdeh Mohtashem...