default search action
International Journal of Social Computing and Cyber-Physical Systems, Volume 1
Volume 1, Number 1, 2011
- Justin Zhan, Xing Fang:
Social computing: the state of the art. 1-12 - Baojun Qiu, Kristinka Ivanova, John Yen, Peng Liu, Frank E. Ritter:
Event-driven modelling of evolving social networks. 13-32 - Denis Helic, Christoph Trattner, Markus Strohmaier, Keith Andrews:
Are tag clouds useful for navigation? A network-theoretic analysis. 33-55 - Eunyoung Moon, Sangki Han:
A qualitative method to find influencers using similarity-based approach in the blogosphere. 56-78 - Owen Macindoe, Whitman Richards:
Comparing networks using their fine structure. 79-97 - Juuso Karikoski, Matti Nelimarkka:
Measuring social relations with multiple datasets. 98-113
Volume 1, Number 2, 2011
- Telmo L. T. Menezes, Camille Roth, Jean-Philippe Cointet:
Finding the semantic-level precursors on a blog network. 115-134 - Stephen Kelley, Mark K. Goldberg, Konstantin Mertsalov, Malik Magdon-Ismail, William A. Wallace:
Overlapping communities in social networks. 135-159 - Shaozhi Ye, Shyhtsun Felix Wu:
Estimating the size of online social networks. 160-179 - Louis Lei Yu, Valerie King:
The evolution of friendships in Chinese online social networks. 180-205 - Georg Groh, Alexander Lehmann:
Deducing evidence for social situations from dynamic geometric interaction data. 206-222
Volume 1, Number 3, 2012
- Aaron Beach, Mike Gartrell, Richard Han:
q-Anon: practical anonymity for social networks. 223-241 - Farzana Rahman, Md. Endadul Hoque, Ferdaus Ahmed Kawsar, Sheikh Iqbal Ahamed:
User privacy protection in pervasive social networking applications using PCO. 242-267 - Miao Jiang, William L. McGill, Yan Cao:
Participatory risk management: concept and illustration. 268-285 - Walter Bamberger, Josef Schlittenlacher, Klaus Diepold:
Ability-aware trust for vehicular networks. 286-307
Volume 1, Number 4, 2016
- Gerard Deepak, Sheeba Priyadarshini:
A hybrid framework for social tag recommendation using context driven social information. 312-325 - Sangeeta Rani, Kanwalvir Singh Dhindsa:
Malware detection techniques and tools for Android. 326-343 - Prabukumar Manoharan, Loganathan Agilandeeswari, M. Sai Praneeth:
Opinion mining for digital India scheme using fuzzy sets. 344-355 - Singh Vijendra:
Big data characteristics, challenges, architectures, analytics and applications: a review. 356-386 - Swapnil S. Ninawe, Pallapa Venkataram:
A method of designing an access mechanism for social networks. 387-408
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.