Social Utility Functions—Part II: Applications

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cloud Computing Utility and Applications

Cloud Architecture provides services on demand basis via internet (WWW) services. Application design in cloud computing environment or the applications which support cloud paradigm are on demand on the basis of user requirement. Those applications provide the support on various hardware, software and other resource requirement on demand. API used in the cloud computing provide the greater advan...

متن کامل

Minimizing User Vulnerability and Retaining Social Utility in Social Media

Privacy and security are major concerns for many users of social media. When users share information (e.g., data and photos) with friends, they can make their friends vulnerable to security and privacy breach with dire consequences. In our recent work, we show that it is feasible to measure user vulnerability and reduce one’s vulnerability without changing the structure of a social networking s...

متن کامل

Utility-Oriented K-Anonymization on Social Networks

“Identity disclosure” problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in nontrivial utility loss. The reason is that the number of the edges modified when anonymizing the social network is the only metric to evaluate utility loss, not considering the fact that different edge modifications have d...

متن کامل

Random Utility Theory for Social Choice

Random utility theory models an agent’s preferences on alternatives by drawing a real-valued score on each alternative (typically independently) from a parameterized distribution, and then ranking the alternatives according to scores. A special case that has received significant attention is the Plackett-Luce model, for which fast inference methods for maximum likelihood estimators are availabl...

متن کامل

Mining Social Media-Utility Based Privacy Preservation

Online social networks and publication of social network data has led to the risk of leakage of confidential information of individuals. This requires the preservation of privacy before such network data is published by service providers. Privacy in online social networks data has been of utmost concern in recent years. Hence, the research in this field is still in its early years. Several publ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews)

سال: 2005

ISSN: 1094-6977

DOI: 10.1109/tsmcc.2004.843200