Login / Signup

Improvements to the Secure Construction and Utilization of Greedy Embeddings in Friend-to-Friend Overlays.

Martin ByrenheidStefanie RoosThorsten Strufe
Published in: Electron. Commun. Eur. Assoc. Softw. Sci. Technol. (2022)
Keyphrases
  • social networks
  • online social networks
  • social networking
  • social network analysis
  • power law
  • search algorithm
  • greedy algorithm
  • neural network
  • dimensionality reduction
  • distance measure
  • high dimensional data