An evaluation of user importance when integrating social networks and mobile cloud computing
暂无分享,去创建一个
Victor C. M. Leung | Laurence T. Yang | Lei Shu | Chunsheng Zhu | Hai Wang | L. Yang | Lei Shu | Chunsheng Zhu | Hai Wang
[1] Hsinchun Chen,et al. Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks , 2004, Decis. Support Syst..
[2] Jie Wu,et al. Outsourcing privacy-preserving social networks to a cloud , 2013, 2013 Proceedings IEEE INFOCOM.
[3] Myungsik Yoo,et al. A new framework for secure sharing data on cloud-based social networks , 2012, 2012 International Conference on ICT Convergence (ICTC).
[4] Carson Kai-Sang Leung,et al. Finding Strong Groups of Friends among Friends in Social Networks , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[5] Sergey Brin,et al. The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.
[6] Ji Yang,et al. Towards Cloud and Terminal Collaborative Mobile Social Network Service , 2010, 2010 IEEE Second International Conference on Social Computing.
[7] Jianlin Li,et al. Agriculture Emergency Decision System Based on Semantic Web Services , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[8] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[9] Christopher C. Yang,et al. Analysis of terrorist social networks with fractal views , 2009, J. Inf. Sci..
[10] Martin F. Arlitt,et al. Facebook Meets the Virtualized Enterprise , 2008, 2008 12th International IEEE Enterprise Distributed Object Computing Conference.
[11] Victor C. M. Leung,et al. A Review of Key Issues That Concern the Feasibility of Mobile Cloud Computing , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[12] Jun Li,et al. Recommendation on social network based on graph model , 2012, Proceedings of the 31st Chinese Control Conference.
[13] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[14] Kyle Chard,et al. Social Cloud: Cloud Computing in Social Networks , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[15] He Nan,et al. Evaluate Nodes Importance in the Network Using Data Field Theory , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[16] Ramon Sangüesa,et al. Extracting reputation in multi agent systems by means of social network topology , 2002, AAMAS '02.
[17] Katarzyna Musial,et al. User position measures in social networks , 2009, SNA-KDD '09.
[18] Kyle Chard,et al. Social Cloud Computing: A Vision for Socially Motivated Resource Sharing , 2012, IEEE Transactions on Services Computing.
[19] Chen-Shu Wang,et al. Constructing a Cloud Computing Based Social Networks Data Warehousing and Analyzing System , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.
[20] Hideki Koike Hirot. Fractal Approaches for Visualizing Huge Hierarchies , 1993 .
[21] Hideki Koike,et al. Fractal views: a fractal-based method for controlling information display , 1995, TOIS.
[22] Fei Hao,et al. TFRank: An Evaluation of Users Importance with Fractal Views in Social Networks , 2011 .
[23] Said Elnaffar,et al. Social Networks: Challenges and New Opportunities , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[24] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.