Social Utility Functions—Part II: Applications
نویسندگان
چکیده
منابع مشابه
Cloud Computing Utility and Applications
Cloud Architecture provides services on demand basis via internet (WWW) services. Application design in cloud computing environment or the applications which support cloud paradigm are on demand on the basis of user requirement. Those applications provide the support on various hardware, software and other resource requirement on demand. API used in the cloud computing provide the greater advan...
متن کاملMinimizing User Vulnerability and Retaining Social Utility in Social Media
Privacy and security are major concerns for many users of social media. When users share information (e.g., data and photos) with friends, they can make their friends vulnerable to security and privacy breach with dire consequences. In our recent work, we show that it is feasible to measure user vulnerability and reduce one’s vulnerability without changing the structure of a social networking s...
متن کاملUtility-Oriented K-Anonymization on Social Networks
“Identity disclosure” problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in nontrivial utility loss. The reason is that the number of the edges modified when anonymizing the social network is the only metric to evaluate utility loss, not considering the fact that different edge modifications have d...
متن کاملRandom Utility Theory for Social Choice
Random utility theory models an agent’s preferences on alternatives by drawing a real-valued score on each alternative (typically independently) from a parameterized distribution, and then ranking the alternatives according to scores. A special case that has received significant attention is the Plackett-Luce model, for which fast inference methods for maximum likelihood estimators are availabl...
متن کاملMining Social Media-Utility Based Privacy Preservation
Online social networks and publication of social network data has led to the risk of leakage of confidential information of individuals. This requires the preservation of privacy before such network data is published by service providers. Privacy in online social networks data has been of utmost concern in recent years. Hence, the research in this field is still in its early years. Several publ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews)
سال: 2005
ISSN: 1094-6977
DOI: 10.1109/tsmcc.2004.843200