메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Gemstone: Empowering decentralized social networking with high data availability

Author keywords

[No Author keywords available]

Indexed keywords

DATA AVAILABILITY; DATA REPLICATION; FACEBOOK; LEARNING MECHANISM; NUMBER OF DATUM; OFFLINE; SOCIAL NETWORKS; SOCIAL RELATIONSHIPS; USER EXPERIENCE;

EID: 84857206955     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2011.6134236     Document Type: Conference Paper
Times cited : (19)

References (17)
  • 2
    • 78249282277 scopus 로고    scopus 로고
    • Abusing social networks for automated user profiling
    • Proceedings of the 13th international conference on Recent advances in intrusion detection, ser. Berlin, Heidelberg: Springer-Verlag, Online. Available
    • M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, and C. Kruegel, "Abusing social networks for automated user profiling," in Proceedings of the 13th international conference on Recent advances in intrusion detection, ser. RAID'10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 422-441. [Online]. Available: http://portal.acm.org/citation. cfm?id=1894166.1894195
    • (2010) RAID'10 , pp. 422-441
    • Balduzzi, M.1    Platzer, C.2    Holz, T.3    Kirda, E.4    Balzarotti, D.5    Kruegel, C.6
  • 7
    • 33847272260 scopus 로고    scopus 로고
    • On the feasibility of commercial, legal P2P content distribution
    • DOI 10.1145/1111322.1111339
    • P. Rodriguez, S.-M. Tan, and C. Gkantsidis, "On the Feasibility of Commercial, Legal P2P Content Distribution," SIGCOMM Comput. Commun. Rev., vol. 36, pp. 75-78, January 2006. (Pubitemid 46323587)
    • (2006) Computer Communication Review , vol.36 , Issue.1 , pp. 75-78
    • Rodriguez, P.1    Tan, S.-M.2    Gkantsidis, C.3
  • 8
    • 77956953218 scopus 로고    scopus 로고
    • Measuring User Behavior in Online Social Networks
    • September
    • L. Gyarmati and T. Trinh, "Measuring User Behavior in Online Social Networks," IEEE Network, vol. 24, no. 5, pp. 26 -31, September 2010.
    • (2010) IEEE Network , vol.24 , Issue.5 , pp. 26-31
    • Gyarmati, L.1    Trinh, T.2
  • 9
    • 70450172971 scopus 로고    scopus 로고
    • PeerSoN: P2P Social Networking: Early Experiences and Insights
    • ACM
    • S. Buchegger, D. Schiöberg, L.-H. Vu, and A. Datta, "PeerSoN: P2P Social Networking: Early Experiences and Insights," in SNS '09. ACM, 2009.
    • (2009) SNS '09
    • Buchegger, S.1    Schiöberg, D.2    Vu, L.-H.3    Datta, A.4
  • 10
    • 72949088489 scopus 로고    scopus 로고
    • Safebook: A Privacy-preserving Online Social Network Leveraging on Real-life Trust
    • L. Cutillo, R. Molva, and T. Strufe, "Safebook: A Privacy-preserving Online Social Network Leveraging on Real-life Trust," Com. Mag., IEEE, vol. 47, no. 12, pp. 94-101, 2009.
    • (2009) Com. Mag., IEEE , vol.47 , Issue.12 , pp. 94-101
    • Cutillo, L.1    Molva, R.2    Strufe, T.3
  • 11
    • 77955881883 scopus 로고    scopus 로고
    • Replica Placement in P2P Storage: Complexity and Game Theoretic Analyses
    • K. Rzadca, A. Datta, and S. Buchegger, "Replica Placement in P2P Storage: Complexity and Game Theoretic Analyses," in IEEE ICDCS '10, June 2010.
    • IEEE ICDCS '10, June 2010
    • Rzadca, K.1    Datta, A.2    Buchegger, S.3
  • 12
    • 84857203061 scopus 로고    scopus 로고
    • Optimizing Peer-to-Peer Backup Using Lifetime Estimations
    • ACM
    • S. Bernard and F. Le Fessant, "Optimizing Peer-to-Peer Backup Using Lifetime Estimations," in EDBT/ICDT Workshops '09. ACM, 2009.
    • (2009) EDBT/ICDT Workshops '09
    • Bernard, S.1    Le Fessant, F.2
  • 14
    • 0038718854 scopus 로고    scopus 로고
    • The Structure and Function of Complex Networks
    • M. E. J. Newman, "The Structure and Function of Complex Networks," SIAM REVIEW, vol. 45, pp. 167-256, 2003.
    • (2003) SIAM REVIEW , vol.45 , pp. 167-256
    • Newman, M.E.J.1
  • 16
    • 84877781555 scopus 로고    scopus 로고
    • Characterizing User Behavior in Online Social Networks
    • ACM
    • F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida, "Characterizing User Behavior in Online Social Networks," in IMC '09. ACM, 2009.
    • (2009) IMC '09
    • Benevenuto, F.1    Rodrigues, T.2    Cha, M.3    Almeida, V.4
  • 17
    • 84865622599 scopus 로고    scopus 로고
    • All your contacts are belong to us: Automated identity theft attacks on social networks
    • ACM
    • L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, "All your contacts are belong to us: automated identity theft attacks on social networks," in WWW '09. ACM, 2009.
    • (2009) WWW '09
    • Bilge, L.1    Strufe, T.2    Balzarotti, D.3    Kirda, E.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.