On the Design of Socially-Aware Distributed Systems
暂无分享,去创建一个
[1] Balachander Krishnamurthy,et al. A few chirps about twitter , 2008, WOSN '08.
[2] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[3] A-L Barabási,et al. Structure and tie strengths in mobile communication networks , 2006, Proceedings of the National Academy of Sciences.
[4] Krishna P. Gummadi,et al. Ostra: Leveraging Trust to Thwart Unwanted Communication , 2008, NSDI.
[5] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[6] Marco Gonzalez,et al. Author's Personal Copy Social Networks Tastes, Ties, and Time: a New Social Network Dataset Using Facebook.com , 2022 .
[7] GeoS: A Service for the Management of Geo-Social Information in a Distributed System , 2010 .
[8] Jennifer Golbeck,et al. The dynamics of Web-based social networks: Membership, relationships, and change , 2007, First Monday.
[9] Pablo Rodriguez,et al. The little engine(s) that could: scaling online social networks , 2012, TNET.
[10] Nick Feamster,et al. Authenticated out-of-band communication over social links , 2008, WOSN '08.
[11] Nam P. Nguyen,et al. A novel method for worm containment on dynamic social networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[12] Refik Molva,et al. Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.
[13] Cristian Borcea,et al. MobiSoC: a middleware for mobile social computing applications , 2009, Mob. Networks Appl..
[14] George Danezis,et al. Sybil-Resistant DHT Routing , 2005, ESORICS.
[15] Sonja Buchegger,et al. PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.
[16] George Varghese,et al. MobiClique: middleware for mobile social networking , 2009, WOSN '09.
[17] Lakshminarayanan Subramanian,et al. Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.
[18] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[19] Jacob Ratkiewicz,et al. Truthy: mapping the spread of astroturf in microblog streams , 2010, WWW.
[20] Krishna P. Gummadi,et al. Exploiting Social Networks for Internet Search , 2006, HotNets.
[21] Adriana Iamnitchi,et al. Cheaters in a gaming social network , 2011, PERV.
[22] David Mazières,et al. RE: Reliable Email , 2006, NSDI.
[23] Sonja Buchegger,et al. A case for P2P infrastructure for social networks - opportunities & challenges , 2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services.
[24] Adriana Iamnitchi,et al. K-path centrality: a new centrality measure in social networks , 2011, SNS '11.
[25] Alec Wolman,et al. Lockr: better privacy for social networks , 2009, CoNEXT '09.
[26] H. Lim,et al. Vis-à-Vis : Online Social Networking via Virtual Individual Ser vers , 2008 .
[27] Adriana Iamnitchi,et al. Vulnerability in socially-informed peer-to-peer systems , 2011, SNS '11.
[28] Krzysztof Rzadca,et al. Decentralized Online Social Networks , 2010, Handbook of Social Network Technologies.
[29] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[30] Ben Y. Zhao,et al. Measurement-calibrated graph models for social network experiments , 2010, WWW '10.
[31] Noah E. Friedkin,et al. Horizons of Observability and Limits of Informal Control in Organizations , 1983 .
[32] Jennifer Neville,et al. Using Transactional Information to Predict Link Strength in Online Social Networks , 2009, ICWSM.
[33] Adriana Iamnitchi,et al. Inferring peer centrality in socially-informed peer-to-peer systems , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.
[34] Jia Zhang,et al. Improving peer-to-peer search performance through intelligent social search , 2009, Expert Syst. Appl..
[35] Mika Raento,et al. ContextPhone: a prototyping platform for context-aware mobile applications , 2005, IEEE Pervasive Computing.
[36] Jennifer Neville,et al. Modeling relationship strength in online social networks , 2010, WWW '10.
[37] Leonard M. Freeman,et al. A set of measures of centrality based upon betweenness , 1977 .
[38] Konstantin Beznosov,et al. The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.
[39] Adriana Iamnitchi,et al. BatTorrent: A Battery-Aware BitTorrent for Mobile Devices , 2009 .
[40] Ramón Cáceres,et al. Vis-à-Vis: Privacy-preserving online social networking via Virtual Individual Servers , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[41] Jinyang Li,et al. Friendstore: cooperative online backup using trusted nodes , 2008, SocialNets '08.
[42] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[43] Jie Liu,et al. SpeakerSense: Energy Efficient Unobtrusive Speaker Identification on Mobile Phones , 2011, Pervasive.
[44] J. Anthonisse. The rush in a directed graph , 1971 .
[45] Sencun Zhu,et al. A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.
[46] Lada A. Adamic,et al. The very small world of the well-connected , 2009 .
[47] Gustavo Alonso,et al. A tuple space for social networking on mobile phones , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).
[48] Jinyang Li,et al. F2F: Reliable Storage in Open Networks , 2006, IPTPS.
[49] Ian T. Foster,et al. Mapping the Gnutella Network , 2002, IEEE Internet Comput..
[50] Jean-Loup Guillaume,et al. Fast unfolding of communities in large networks , 2008, 0803.0476.
[51] Cristian Borcea,et al. Analysis of fusing online and co-presence social networks , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[52] Erdong Chen,et al. Facebook immune system , 2011, SNS '11.
[53] Alexandru Iosup,et al. TRIBLER: a social-based peer-to-peer system: Research Articles , 2008 .
[54] B. Wellman. Structural analysis: From method and metaphor to theory and substance. , 1988 .
[55] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[56] Mirco Musolesi,et al. Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application , 2008, SenSys '08.
[57] Hector Garcia-Molina,et al. SPROUT: P2P Routing with Social Networks , 2004, EDBT Workshops.
[58] Miguel Castro,et al. Scribe: a large-scale and decentralized application-level multicast infrastructure , 2002, IEEE J. Sel. Areas Commun..
[59] M E J Newman,et al. Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.
[60] Cheng-Fu Chou,et al. Distributed Social-based Overlay Adaptation for Unstructured P2P Networks , 2007, 2007 IEEE Global Internet Symposium.
[61] S. Borgatti,et al. The centrality of groups and classes , 1999 .
[62] Guillaume Pierre,et al. A survey of DHT security techniques , 2011, CSUR.
[63] M. Newman,et al. Finding community structure in very large networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[64] Andrew S. Tanenbaum,et al. Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System , 2004, Security Protocols Workshop.
[65] P. Oscar Boykin,et al. Collaborative Spam Filtering Using E-Mail Networks , 2006, Computer.
[66] M. Frans Kaashoek,et al. Whanau: A Sybil-proof Distributed Hash Table , 2010, NSDI.
[67] Robin I. M. Dunbar,et al. The costs of family and friends: an 18-month longitudinal study of relationship maintenance and decay , 2011 .
[68] Xiaoning Ding,et al. Measurements, analysis, and modeling of BitTorrent-like systems , 2005, IMC '05.
[69] Cecilia Mascolo,et al. Socio-Spatial Properties of Online Location-Based Social Networks , 2011, ICWSM.
[70] Adriana Iamnitchi,et al. Identifying high betweenness centrality nodes in large social networks , 2012, Social Network Analysis and Mining.
[71] Kôiti Hasida,et al. POLYPHONET: an advanced social network extraction system from the web , 2006, WWW '06.
[72] Mark S. Granovetter. The Strength of Weak Ties , 1973, American Journal of Sociology.
[73] Lada A. Adamic,et al. Search in Power-Law Networks , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.
[74] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[75] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[76] Adriana Iamnitchi,et al. The Social Hourglass: An Infrastructure for Socially Aware Applications and Services , 2012, IEEE Internet Computing.
[77] M E J Newman,et al. Finding and evaluating community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[78] Daniel Stutzbach,et al. On the Long-term Evolution of the Two-Tier Gnutella Overlay , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[79] Liam McNamara,et al. A middleware service for pervasive social networking , 2009, M-PAC '09.
[80] Refik Molva,et al. On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network , 2009, PrimeLife.
[81] Rossano Schifanella,et al. Tempering Kademlia with a Robust Identity Based System , 2008, 2008 Eighth International Conference on Peer-to-Peer Computing.
[82] Alex Pentland,et al. Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.
[83] A. Vázquez. Growing network with local rules: preferential attachment, clustering hierarchy, and degree correlations. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[84] Stephen Farrell,et al. Harvesting with SONAR: the value of aggregating social network information , 2008, CHI.
[85] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[86] Marc Barthelemy,et al. Group betweenness and co-betweenness: Inter-related notions of coalition centrality , 2009, Soc. Networks.
[87] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[88] Jure Leskovec,et al. Statistical properties of community structure in large social and information networks , 2008, WWW.
[89] Ben Y. Zhao,et al. User interactions in social networks and their implications , 2009, EuroSys '09.
[90] Panayotis Antoniadis,et al. Incentives for resource sharing in self-organized communities: From economics to social psychology , 2007, 2007 2nd International Conference on Digital Information Management.
[91] Ramón Cáceres,et al. Privacy, cost, and availability tradeoffs in decentralized OSNs , 2009, WOSN '09.
[92] C. Lee Giles,et al. Self-Organization and Identification of Web Communities , 2002, Computer.
[93] Helen Nissenbaum,et al. Privacy and contextual integrity: framework and applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[94] Paul Anderson,et al. On managing social data for enabling socially-aware applications and services , 2010, SNS '10.
[95] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[96] Bernardo A. Huberman,et al. Rhythms of social interaction: messaging within a massive online network , 2006, ArXiv.
[97] Michael Szell,et al. Measuring social dynamics in a massive multiplayer online game , 2009, Soc. Networks.
[98] Antony I. T. Rowstron,et al. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.
[99] Shivakant Mishra,et al. Fusing mobile, sensor, and social data to fully enable context-aware computing , 2010, HotMobile '10.
[100] Matei Ripeanu,et al. Branded with a scarlet "C": cheaters in a gaming social network , 2012, WWW.
[101] Giancarlo Ruffo,et al. LotusNet: Tunable privacy for distributed online social network services , 2012, Comput. Commun..
[102] Ralf Steinmetz,et al. LifeSocial.KOM: A secure and P2P-based solution for online social networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[103] Mary Baker,et al. The LOCKSS peer-to-peer digital preservation system , 2005, TOCS.
[104] Valérie Issarny,et al. Yarta: A Middleware for Managing Mobile Social Ecosystems , 2011, GPC.
[105] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks , 2010, IEEE/ACM Trans. Netw..
[106] Paul Anderson,et al. Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications , 2010, Middleware.
[107] Yaoru Sun,et al. SELF‐ORGANIZING PEER‐TO‐PEER SOCIAL NETWORKS , 2008, Comput. Intell..
[108] Robin I. M. Dunbar. Grooming, Gossip and the Evolution of Language , 1996 .
[109] J. Nieminen. On the centrality in a graph. , 1974, Scandinavian journal of psychology.