A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks
暂无分享,去创建一个
[1] Mohan S. Kankanhalli,et al. An efficient access control method for multimedia social networks , 2010, WSM@MM.
[2] Mark S. Granovetter. The Strength of Weak Ties , 1973, American Journal of Sociology.
[3] Hua Wang,et al. Trust-Involved Access Control in Collaborative Open Social Networks , 2010, 2010 Fourth International Conference on Network and System Security.
[4] Jure Leskovec,et al. Defining and Evaluating Network Communities Based on Ground-Truth , 2012, ICDM.
[5] Yuan Cheng,et al. A User-Activity-Centric Framework for Access Control in Online Social Networks , 2011, IEEE Internet Computing.
[6] M E J Newman,et al. Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.
[7] Panagiotis Papadimitratos,et al. Privacy-Preserving Relationship Path Discovery in Social Networks , 2009, CANS.
[8] Elena Ferrari,et al. Combining access control and trust negotiations in an On-line Social Network , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).
[9] Barbara Carminati,et al. P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks , 2011, 2011 IEEE 35th Annual Computer Software and Applications Conference.
[10] Barbara Carminati,et al. A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks , 2011, CODASPY '11.
[11] Przemyslaw Kazienko,et al. Shortest Path Discovery in the Multi-layered Social Network , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.
[12] Mudhakar Srivatsa,et al. Modeling data flow in socio-information networks: a risk estimation approach , 2011, SACMAT '11.
[13] MyoungBeom Chung,et al. Intelligent copyright protection system using a matching video retrieval algorithm , 2011, Multimedia Tools and Applications.
[14] Xi Chen,et al. Content distribution and copyright authentication based on combined indexing and watermarking , 2010, Multimedia Tools and Applications.
[15] Lili Zhang,et al. A Novel DRM Security Scheme and its Prototype System Implementation , 2011 .
[16] Richard Chbeir,et al. Discovering relationship types between users using profiles and shared photos in a social network , 2013, Multimedia Tools and Applications.
[17] Kanliang Wang,et al. A trust model for multimedia social networks , 2012, Social Network Analysis and Mining.
[18] Zhiyong Zhang,et al. Digital Rights Management Ecosystem and its Usage Controls: A Survey , 2011 .
[19] Zhiyong Zhang. Security, trust and risk in Digital Rights Management ecosystem , 2010, 2010 International Conference on High Performance Computing & Simulation.