JH Cho, A Swami, R Chen - IEEE communications surveys & …, 2010 - ieeexplore.ieee.org
Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when collaboration or cooperation is critical to achieving mission and system goals such as …
“Nature shows us only the tail of the lion. But I do not doubt that the lion belongs to it even though he cannot at once reveal himself because of his enormous size.”–Albert Einstein The …
This study is informed by two research gaps. One, Artificial Intelligence's (AI's) Machine Learning (ML) techniques have the potential to help separate information and …
Centrality is one of the most studied concepts in social network analysis. There is a huge literature regarding centrality measures, as ways to identify the most relevant users in a …
In this age of information overload, people use a variety of strategies to make choices about what to buy, how to spend their leisure time, and even whom to date. Recommender …
M Nitti, R Girau, L Atzori - IEEE Transactions on knowledge and …, 2013 - ieeexplore.ieee.org
The integration of social networking concepts into the Internet of things has led to the Social Internet of Things (SIoT) paradigm, according to which objects are capable of establishing …
Recently, there has been tremendous interest in the phenomenon of influence propagation in social networks. The studies in this area assume they have as input to their problems a …
Social network analysis has gained significant attention in recent years, largely due to the success of online social networking and media-sharing sites, and the consequent …
P Gundecha, H Liu - New directions in informatics …, 2012 - pubsonline.informs.org
The pervasive use of social media has generated unprecedented amounts of social data. Social media provides easily an accessible platform for users to share information. Mining …