Marie Curie Initial Training Networks

Scientific Papers


Journal and Magazine Papers

[J4] Kleineberg Kaj-Kolja, Boguñá Marián, A 1:1000 scale model of the digital world: Global connectivity can lead to the extinction of local networks, arXiv:1504.01368, April, 2015 (pdf)

[J3] Kleineberg Kaj-Kolja, Boguñá Marián, Ecology 2.0: Coexistence and domination among interacting networks, ArXiv:1410.8865, 2014 (pdf)

[J2] Kleineberg Kaj-Kolja, Boguñá Marián, Evolution of the Digital Society Reveals Balance between Viral and Mass Media Influence, Physical Review X, Volume 4, Issue 3, 2014 (pdf)

[J1] Roberto Roverso, Sameh El-Ansary, and Mikael Högqvist. On HTTP live streaming in large enterprises. SIGCOMM Computer Communication Review 43, 4 (August 2013), 489-490 (pdf)  

Conference and Workshop Papers 

[C9] Identification of Key Locations based on Online Social Network Activity", Efstathiades, Hariton and Antoniades, Demetris and Pallis, George and Dikaiakos, Marios D, (EEE/ACM International Conference on Advances in Social Networks Analysis and Mining), Paris, France 2015 (pdf)

[C8] Amira Soliman, Leila Bahri, Barbara Carminati, Elena Ferrari and Sarunas Girdzijauskas, DIVa: Decentralized Identity Validation for Social Networks, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015 (pdf)

[C7]Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, Sotiris Ioannidis,  Face/Off: Preventing Privacy Leakage From Photos in Social Networks. To appear at the 22nd ACM Conference on Computer and Communications Security (CCS), October 2015, Denver, Colorado, USA. (pdf)

[C5] Leila Bahri., Barbara Carminati, Elena Ferrari, Community-Based Identity Validation on Online Social Networks, Distributed Computing Systems (ICDCS), 2014 IEEE 34th International Conference on , vol., no., pp.21,30, 2014 (pdf)

[C4] Giovanni Simoni, Roberto Roverso, and Alberto Montresor. RankSlicing: A decentralized protocol for supernode selection. In the IEEE International Conference on Peer-to-Peer Computing (P2P14), 2014. (pdf)

[C3] Iasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, Angelos D. Keromytis, Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication,  21st ACM Conference on Computer and Communications Security (CCS), November 2014, 501-512. (pdf)

[C2] Muhammad Anis Uddin Nasir, Fatemeh Rahimian, and Sarunas Girdzijauskas, Gossip-based Partitioning and Replication for Online Social Networks, The IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM'14), 2014 (pdf)

[C1] Mikael Hogqvist, Reinefeld A, RECODE: Reconfigurable, consistent and decentralized data services, Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on, pp.1,10, 9-11 September 2013 (pdf)




You have no rights to post comments