Sciweavers

171 search results - page 12 / 35
» cse 2009
Sort
View
CSE
2009
IEEE
15 years 1 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
CSE
2009
IEEE
14 years 7 months ago
The Influence of Personalities Upon the Dynamics of Trust and Reputation
When an agent resides in a community, the opinion of other community members concerning whether a particular individual is trustworthy or not influences the trust level of this ag...
Mark Hoogendoorn, S. Waqar Jaffry
59
Voted
CSE
2009
IEEE
15 years 4 months ago
Predicting Interests of People on Online Social Networks
—We introduce a new data set which contains both a self-declared friendship network and self-chosen attributes from a finite list defined by the social networking site. We prop...
Apoorv Agarwal, Owen Rambow, Nandini Bhardwaj
CSE
2009
IEEE
15 years 4 months ago
Has Anyone Seen My Goose? Social Network Services in Developing Regions
Abstract— In developing regions, Internet connectivity is extremely poor, while mobile phone penetration is much higher. The inhabitants of developing conuntries still rely on tr...
Narseo Vallina-Rodriguez, Pan Hui, Jon Crowcroft
CSE
2009
IEEE
15 years 2 months ago
Social Learning Applications in Resource Constrained Networks
Efficient design of social networking applications must take account of two guiding principles: the adaptive processes by which humans learn and spread new information, and the co...
Ali Saidi, Mahesh V. Tripunitara, Mojdeh Mohtashem...