Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1578002acmconferencesBook PagePublication PageseurosysConference Proceedingsconference-collections
SNS '09: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems
ACM2009 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
EuroSys '09: Fourth EuroSys Conference 2009 Nuremberg Germany 31 March 2009
ISBN:
978-1-60558-463-8
Published:
31 March 2009
Sponsors:
Next Conference
March 30 - April 3, 2025
Rotterdam , Netherlands
Reflects downloads up to 18 Feb 2025Bibliometrics
Skip Abstract Section
Abstract

Humans have formed social networks since the dawn of history. Only in the past several years have these networks been represented within computers accessible from anywhere. This is a big change, with vast consequences not yet understood.

For the computer systems researcher, social network systems present special challenges and opportunities. The trust network can be exploited to improve computer systems. New forms of workloads stress existing systems; databases, file systems, computer networks. This workshop provides a forum for researchers to exchange ideas on these topics.

Last year, we noted that social network systems had been neglected by researchers. That is no longer so true. Since our first workshop, a number of other research venues have popped up.

Last year, the majority of our submissions and accepted papers came from North America. This year, we were disappointed to not receive a single submission from that continent. This may be related to poor economic conditions and decreased travel budgets. Fortunately, we did receive thirteen submissions, and from those accepted eight into the workshop. We are pleased with the quality of the final papers and the strength and depth of the program.

The papers are organized into three sessions; personalized search, social graph structure, and privacy and security. Discussion during the workshop ranged across the merits of decentralized versus centralized architectures and designing for privacy.

Despite a tight reviewing schedule, all submissions received at least four reviews from program committee members. Several papers were shepherded to improve their presentation and clarity.

Skip Table Of Content Section
research-article
Toward personalized peer-to-peer top-k processing

We present the first personalized peer-to-peer top-k search protocol for a collaborative tagging system. Each peer maintains relevant personalized information about its tagging behavior as well as that of its social neighbors, and uses those to locally ...

research-article
Toward personalized query expansion

Social networking and tagging have taken off at an unexpected scale and speed, opening huge opportunities to enhance the user search experience. We present Gossple, a new, user-centric, approach to improve the exploration of the Internet. Underlying ...

research-article
Eight friends are enough: social graph approximation via public listings

The popular social networking website Facebook exposes a "public view" of user profiles to search engines which includes eight of the user's friendship links. We examine what interesting properties of the complete social graph can be inferred from this ...

research-article
On the strength of weak ties in mobile social networks

Weak ties, introduced in the seminal paper by Granovetter [6], refer to people's relationships with acquaintances outside their social circle (i.e., acquaintances with which they interact infrequently). We show that weak ties play an important role on ...

research-article
Anonymous opinion exchange over untrusted social networks

Social networks are the fastest growing Internet applications. They offer the possibility to get in touch with current friends, discover where the old ones are, and make new ones. While these applications are a great enabler for our social life, they ...

research-article
Centralities: capturing the fuzzy notion of importance in social graphs

The increase of interest in the analysis of contemporary social networks, for both academic and economic reasons, has highlighted the inherent difficulties in handling large and complex structures. Among the tools provided by researchers for network ...

research-article
Buzztraq: predicting geographical access patterns of social cascades using social networks

Web 2.0 sites have made networked sharing of user generated content increasingly popular. Serving rich-media content with strict delivery constraints requires a distribution infrastructure. Traditional caching and distribution algorithms are optimised ...

research-article
PeerSoN: P2P social networking: early experiences and insights

To address privacy concerns over Online Social Networks (OSNs), we propose a distributed, peer-to-peer approach coupled with encryption. Moreover, extending this distributed approach by direct data exchange between user devices removes the strict ...

Contributors
  • Max Planck Institute for Security and Privacy
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations