Network analysis has proved to be very useful in many social and natural sciences, and in particular Small World topologies have been exploited in many application fields. In this article, we focus on P2P file sharing applications, where spontaneous communities of users are studied and analyzed. We define a family of structures that we call “Affinity Networks” (or even Graphs) that show self-organized interest-based clusters. Empirical evidence proves that affinity networks are small worlds and shows scale-free features. The relevance of this finding is augmented with the introduction of a proactive recommendation scheme, namely DeHinter, that exploits this natural feature. The intuition behind this scheme is that a user would trust her net...
In Peer-to-Peer (P2P) file sharing systems, peers spend a significant amount of time looking for rel...
In collaborative filtering recommender systems, there is little room for users to get involved in th...
textabstractRecommendation systems are important in social networks that allow the injection of user...
Network analysis has proved to be very useful in many social and natural sciences, and in particular...
Small World patterns have been found in many social and natural networks, and even in Peer-to-Peer t...
Abstract. Small World patterns have been found in many social and natural networks, and even in Peer...
The success and intensive use of social networks makes strategies for efficient document location a ...
The validation of a recommender system is always a quite hazardous task, because of the difficulty o...
The advent of the Semantic Web necessitates paradigm shifts away from centralized client/server arch...
Abstract — Web caches, content distribution networks, peer-to-peer file sharing networks, distribute...
The advent of the Semantic Web necessitates paradigm shifts away from centralized client/server arch...
In collaborative filtering recommender systems, users cannot get involved in the choice of their pee...
Abstract-We focus on peer-to-peer (P2P) content recommenda-tion for on-line communities, where socia...
Peer-to-peer, social interactions, small world, performance evaluations, simulation
Gossip-based peer-to-peer protocols proved to be very efficient for supporting dynamic and complex i...
In Peer-to-Peer (P2P) file sharing systems, peers spend a significant amount of time looking for rel...
In collaborative filtering recommender systems, there is little room for users to get involved in th...
textabstractRecommendation systems are important in social networks that allow the injection of user...
Network analysis has proved to be very useful in many social and natural sciences, and in particular...
Small World patterns have been found in many social and natural networks, and even in Peer-to-Peer t...
Abstract. Small World patterns have been found in many social and natural networks, and even in Peer...
The success and intensive use of social networks makes strategies for efficient document location a ...
The validation of a recommender system is always a quite hazardous task, because of the difficulty o...
The advent of the Semantic Web necessitates paradigm shifts away from centralized client/server arch...
Abstract — Web caches, content distribution networks, peer-to-peer file sharing networks, distribute...
The advent of the Semantic Web necessitates paradigm shifts away from centralized client/server arch...
In collaborative filtering recommender systems, users cannot get involved in the choice of their pee...
Abstract-We focus on peer-to-peer (P2P) content recommenda-tion for on-line communities, where socia...
Peer-to-peer, social interactions, small world, performance evaluations, simulation
Gossip-based peer-to-peer protocols proved to be very efficient for supporting dynamic and complex i...
In Peer-to-Peer (P2P) file sharing systems, peers spend a significant amount of time looking for rel...
In collaborative filtering recommender systems, there is little room for users to get involved in th...
textabstractRecommendation systems are important in social networks that allow the injection of user...