-
1
-
-
84860875663
-
Online team formation in social networks
-
Aris Anagnostopoulos, Luca Becchetti, Carlos Castillo, Aristides Gionis, and Stefano Leonardi. 2012. Online team formation in social networks. In WWW. 839-848.
-
(2012)
WWW
, pp. 839-848
-
-
Anagnostopoulos, A.1
Becchetti, L.2
Castillo, C.3
Gionis, A.4
Leonardi, S.5
-
2
-
-
79251640709
-
Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data
-
2011
-
Ankur Bansal, Tingting Chen, and Sheng Zhong. 2011. Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data. Neural Computing and Applications 20, 1(2011), 143-150.
-
(2011)
Neural Computing and Applications
, vol.20
, Issue.1
, pp. 143-150
-
-
Bansal, A.1
Chen, T.2
Zhong, S.3
-
3
-
-
85012127915
-
Privacy-preserving indexing of documents on the network
-
Mayank Bawa, Roberto J. Bayardo Jr., and Rakesh Agrawal. 2003. Privacy-preserving indexing of documents on the network. In VLDB (2004-01-06). 922-933.
-
(2003)
VLDB (2004-01-06)
, pp. 922-933
-
-
Bawa, M.1
Roberto, J.B.2
Agrawal, R.3
-
4
-
-
29244468339
-
Semirings for soft constraint solving and programming
-
Springer
-
Stefano Bistarelli. 2004. Semirings for Soft Constraint Solving and Programming. Lecture Notes in Computer Science, Vol. 2962. Springer.
-
(2004)
Lecture Notes in Computer Science
, vol.2962
-
-
Bistarelli, S.1
-
6
-
-
0031095278
-
Semiring-based constraint satisfaction and optimization
-
1997
-
Stefano Bistarelli, Ugo Montanari, and Francesca Rossi. 1997. Semiring-based constraint satisfaction and optimization. J. A C M 44, 2(1997), 201-236.
-
(1997)
J. A C M
, vol.44
, Issue.2
, pp. 201-236
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
7
-
-
45949105508
-
Crowdsourcing as a model for problem solving an introduction and cases
-
2008
-
Daren C. Brabham. 2008. Crowdsourcing as a model for problem solving an introduction and cases. Convergence 14, 1(2008), 75-90.
-
(2008)
Convergence
, vol.14
, Issue.1
, pp. 75-90
-
-
Brabham, D.C.1
-
8
-
-
70350406398
-
Enforcing access control in Web-based social networks
-
2009
-
Barbara Carminati, Elena Ferrari, and Andrea Perego. 2009. Enforcing access control in Web-based social networks. ACM Trans. Inf. Syst. Secur. 13, 1(2009), 6:1-6:38.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.1
, pp. 61-638
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
9
-
-
84893032455
-
Crowdsourced judgement elicitation with endogenous proficiency
-
Anirban Dasgupta and Arpita Ghosh. 2013. Crowdsourced judgement elicitation with endogenous proficiency. In WWW. 319-330.
-
(2013)
WWW
, pp. 319-330
-
-
Dasgupta, A.1
Ghosh, A.2
-
10
-
-
79957820913
-
Using markov chain monte carlo to play trivia
-
Daniel Deutch, Ohad Greenshpan, Boris Kostenko, and Tova Milo. 2011. Using Markov chain Monte Carlo to play trivia. In ICDE. 1308-1311.
-
(2011)
ICDE
, pp. 1308-1311
-
-
Deutch, D.1
Greenshpan, O.2
Kostenko, B.3
Milo, T.4
-
11
-
-
79953645302
-
Crowdsourcing systems on the world-wide web
-
April 2011
-
Anhai Doan, Raghu Ramakrishnan, and Alon Y. Halevy. 2011. Crowdsourcing systems on the World-Wide Web. Commun. ACM 54, 4(April 2011), 86-96. DOI: http://dx.doi.org/10.1145/1924421.1924442
-
(2011)
Commun. ACM
, vol.54
, Issue.4
, pp. 86-96
-
-
Doan, A.1
Ramakrishnan, R.2
Halevy, A.Y.3
-
12
-
-
80051813966
-
Interaction mining and skilldependent recommendations for multi-objective team composition
-
2011
-
Christoph Dorn, Florian Skopik, Daniel Schall, and Schahram Dustdar. 2011. Interaction mining and skilldependent recommendations for multi-objective team composition. Data Knowl. Eng. 70, 10(2011), 866-891.
-
(2011)
Data Knowl. Eng.
, vol.70
, Issue.10
, pp. 866-891
-
-
Dorn, C.1
Skopik, F.2
Schall, D.3
Dustdar, S.4
-
15
-
-
79959958767
-
CrowdDB: Answering queries with crowdsourcing
-
Michael J. Franklin, Donald Kossmann, Tim Kraska, Sukriti Ramesh, and Reynold Xin. 2011. CrowdDB: Answering queries with crowdsourcing. In SIGMOD Conference. 61-72.
-
(2011)
SIGMOD Conference
, pp. 61-72
-
-
Franklin, M.J.1
Kossmann, D.2
Kraska, T.3
Ramesh, S.4
Xin, R.5
-
16
-
-
84860868169
-
Crowdsourcing with endogenous entry
-
Arpita Ghosh and R. Preston McAfee. 2012. Crowdsourcing with endogenous entry. In WWW. 999-1008.
-
(2012)
WWW
, pp. 999-1008
-
-
Ghosh, A.1
Preston McAfee, R.2
-
18
-
-
77951192010
-
Accurate estimation of the degree distribution of private networks
-
Michael Hay, Chao Li, Gerome Miklau, and David Jensen. 2009. Accurate estimation of the degree distribution of private networks. In ICDM. 169-178.
-
(2009)
ICDM
, pp. 169-178
-
-
Hay, M.1
Li, C.2
Miklau, G.3
Jensen, D.4
-
19
-
-
77954715960
-
Optimizing linear counting queries under differential privacy
-
Michael Hay, Chao Li, Vibhor Rastogi, Gerome Miklau, and Andrew McGregor. 2010. Optimizing linear counting queries under differential privacy. In PODS. 123-134.
-
(2010)
PODS
, pp. 123-134
-
-
Hay, M.1
Li, C.2
Rastogi, V.3
Miklau, G.4
McGregor, A.5
-
20
-
-
44649178568
-
Metcalfe's law, Web 2.0, and the semantic web
-
Feb. 2008
-
James Hendler and Jennifer Golbeck. 2008. Metcalfe's law, Web 2.0, and the semantic web. Web Semant. 6, 1(Feb. 2008), 14-20. DOI: http://dx.doi.org/10.1016/j.websem.2007.11.008
-
(2008)
Web Semant. 6, 1
, pp. 14-20
-
-
Hendler, J.1
Golbeck, J.2
-
21
-
-
0003541456
-
Finite markov chains and algorithmic applications
-
Cambridge University Press
-
Olle Hoggstrom. 2000. Finite markov chains and algorithmic applications. In London Mathematical Society Student Texts. Cambridge University Press.
-
(2000)
London Mathematical Society Student Texts
-
-
Hoggstrom, O.1
-
22
-
-
79958122721
-
Analyzing the amazon mechanical turk marketplace
-
2010
-
Panagiotis G. Ipeirotis. 2010. Analyzing the Amazon Mechanical Turk marketplace. ACM Crossroads 17, 2(2010), 16-21.
-
(2010)
ACM Crossroads
, vol.17
, Issue.2
, pp. 16-21
-
-
Ipeirotis, P.G.1
-
23
-
-
84882709595
-
Answering planning queries with the crowd
-
2013
-
Haim Kaplan, Ilia Lotosh, Tova Milo, and Slava Novgorodov. 2013. Answering planning queries with the crowd. PVLDB 6, 9(2013), 697-708.
-
(2013)
PVLDB
, vol.6
, Issue.9
, pp. 697-708
-
-
Kaplan, H.1
Lotosh, I.2
Milo, T.3
Novgorodov, S.4
-
24
-
-
35048840726
-
Clustering with soft and group constraints
-
Martin H. C. Law, Alexander P. Topchy, and Anil K. Jain. 2004. Clustering with soft and group constraints. In SSPR/SPR. 662-670.
-
(2004)
SSPR/SPR
, pp. 662-670
-
-
Law, M.H.C.1
Topchy, A.P.2
Jain, A.K.3
-
27
-
-
84873126754
-
Deco: A system for declarative crowdsourcing
-
Aug. 2012
-
Hyunjung Park, Hector Garcia-Molina, Richard Pang, Neoklis Polyzotis, Aditya Parameswaran, and Jennifer Widom. 2012. Deco: A system for declarative crowdsourcing. Proc. VLDB Endow. 5, 12(Aug. 2012), 1990-1993.
-
(2012)
Proc. VLDB Endow.
, vol.5
, Issue.12
, pp. 1990-1993
-
-
Park, H.1
Garcia-Molina, H.2
Pang, R.3
Polyzotis, N.4
Parameswaran, A.5
Widom, J.6
-
28
-
-
84856078541
-
Towards social crowd environments using service-oriented architectures
-
2011
-
Florian Skopik, Daniel Schall, Harald Psaier, Martin Treiber, and Schahram Dustdar. 2011. Towards social crowd environments using service-oriented architectures. IT - Inf. Technol. 53, 3(2011), 108-116.
-
(2011)
IT - Inf. Technol.
, vol.53
, Issue.3
, pp. 108-116
-
-
Skopik, F.1
Schall, D.2
Psaier, H.3
Treiber, M.4
Dustdar, S.5
-
29
-
-
77952665888
-
Privometer: Privacy protection in social networks
-
Nilothpal Talukder, Mourad Ouzzani, Ahmed K. Elmagarmid, Hazem Elmeleegy, and Mohamed Yakout. 2010. Privometer: Privacy protection in social networks. In ICDE Workshops. 266-269.
-
(2010)
ICDE Workshops
, pp. 266-269
-
-
Talukder, N.1
Ouzzani, M.2
Elmagarmid, A.K.3
Elmeleegy, H.4
Yakout, M.5
-
30
-
-
83055187000
-
Privacy preserving indexing for eHealth information networks
-
Craig Macdonald, Iadh Ounis, and Ian Ruthven Eds., ACM
-
Yuzhe Tang, Ting Wang, Ling Liu, Shicong Meng, and Balaji Palanisamy. 2011. Privacy preserving indexing for eHealth information networks. In CIKM, Craig Macdonald, Iadh Ounis, and Ian Ruthven (Eds.). ACM, 905-914.
-
(2011)
CIKM
, pp. 905-914
-
-
Tang, Y.1
Wang, T.2
Liu, L.3
Meng, S.4
Palanisamy, B.5
-
31
-
-
84880551539
-
Leveraging transitive relations for crowdsourced joins
-
Jiannan Wang, Guoliang Li, Tim Kraska, Michael J. Franklin, and Jia Feng. 2013. Leveraging transitive relations for crowdsourced joins. In Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD'13). 229-240. DOI: http://dx.doi.org/10.1145/2463676.2465280
-
(2013)
Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD'13)
, pp. 229-240
-
-
Wang, J.1
Li, G.2
Kraska, T.3
Franklin, M.J.4
Feng, J.5
-
32
-
-
79960177943
-
Modeling data flow in socioinformation networks: A risk estimation approach
-
Ting Wang, Mudhakar Srivastsa, Dakshi Agrawal, and Ling Liu. 2011. Modeling data flow in socioinformation networks: A risk estimation approach. In SACMAT.
-
(2011)
SACMAT
-
-
Wang, T.1
Srivastsa, M.2
Agrawal, D.3
Liu, L.4
-
34
-
-
77954603933
-
Modeling relationship strength in online social networks
-
Rongjing Xiang, Jennifer Neville, and Monica Rogati. 2010. Modeling relationship strength in online social networks. In WWW. 981-990.
-
(2010)
WWW
, pp. 981-990
-
-
Xiang, R.1
Neville, J.2
Rogati, M.3
|