Abstract is missing.
- Belief Manipulation: A Formal Model of Deceit in Message Passing SystemsAaron Hunter. 1-8 [doi]
- Region of Interest Discovery in Location-Based Social Networking Services with Protected LocationsRong Tan, Junzhong Gu, Peng Chen 0005, Zhou Zhong. 9-18 [doi]
- Label Micro-blog Topics Using the Bayesian Inference MethodHeng Gao, Qiudan Li, Xiaolong Zheng. 19-28 [doi]
- Collective Intelligence for Suicide Surveillance in Web ForumsTim M. H. Li, Ben C. M. Ng, Michael Chau, Paul W. C. Wong, Paul S. F. Yip. 29-37 [doi]
- Computing Optimal Attack Strategies Using Unconstrained Influence DiagramsViliam Lisý, Radek Píbil. 38-46 [doi]
- Identifying Peer Influence in Online Social Networks Using Transfer EntropySaike He, Xiaolong Zheng, Daniel Zeng, Kainan Cui, Zhu Zhang, Chuan Luo. 47-61 [doi]
- Modeling Relationship Strength for Link PredictionNing Li, Xu Feng, Shufan Ji, Ke Xu. 62-74 [doi]
- What Is the Uniqueness of Growth Pattern in Human Flesh Search Organization?Tao Wang, Qingpeng Zhang, Julei Fu, Xiao Wang, Suncong Zheng. 75-81 [doi]
- Energy Saving Replay Attack Prevention in Clustered Wireless Sensor NetworksAmrita Ghosal, Aadirupa Saha, Sipra Das Bit. 82-96 [doi]
- Detecting Web Attacks Based on Domain StatisticsChia-Mei Chen, Jhe-Jhun Huang, Ya-Hui Ou. 97-106 [doi]
- A Novel Key Scheme Based on QR Decomposition for Wireless Sensor NetworksWeimin Xie, Liejun Wang, Mingwei Wang. 107-115 [doi]