


default search action
Social Network Analysis and Mining, Volume 5
Volume 5, Number 1, 2015
- Mohammad Moshirpour, Shimaa M. El-Sherif, Reda Alhajj, Behrouz H. Far:
Verification of lack of emergent behavior in extending a social network of agents. 1:1-1:13 - Kyumin Lee, Steve Webb, Hancheng Ge:
Characterizing and automatically detecting crowdturfing in Fiverr and Twitter. 2:1-2:16 - Marcos A. C. Oliveira, Carmelo J. A. Bastos Filho
, Ronaldo Menezes
:
Using network science to assess particle swarm optimizers. 3:1-3:13 - Róbert Pálovics, András A. Benczúr:
Temporal influence over the Last.fm social network. 4:1-4:12 - William Frankenstein
, Ghita Mezzour, Kathleen M. Carley
, L. Richard Carley:
Remote assessment of countries' nuclear, biological, and cyber capabilities: joint motivation and latent capability approach. 5:1-5:21 - Ran He, Tian Zheng:
GLMLE: graph-limit enabled fast computation for fitting exponential random graph models to large social networks. 8:1-8:19 - Jon Parker, Andrew Yates, Nazli Goharian, Ophir Frieder:
Health-related hypothesis generation using social media data. 7:1-7:15 - Rui Zeng, Quan Z. Sheng
, Lina Yao:
A simulation method for social networks. 6:1-6:14 - Andrew Runka, Tony White:
Towards intelligent control of influence diffusion in social networks. 9:1-9:15 - Lotfi Bouzguenda, Mahdi Abdelkafi:
An agent-based approach for organizational structures and interaction protocols mining in workflow. 10:1-10:22 - Tanay Kumar Saha
, Baichuan Zhang, Mohammad Al Hasan:
Name disambiguation from link data in a collaboration graph using temporal and topological features. 11:1-11:14 - Adriano Galati, Karim Djemame
, Chris Greenhalgh
:
Analysis of human mobility patterns for opportunistic forwarding in shopping mall environments. 12:1-12:14 - Xiang Ji, Soon Ae Chun
, Zhi Wei
, James Geller:
Twitter sentiment classification for measuring public health concerns. 13:1-13:25 - Hemank Lamba, Ramasuri Narayanam:
A model-independent approach for efficient influence maximization in social networks. 14:1-14:11 - Wenjun Wang
, William Nick Street:
Modeling influence diffusion to uncover influence centrality and community structure in social networks. 15:1-15:16 - Tanmoy Chakraborty
, Niloy Ganguly
, Animesh Mukherjee:
An author is known by the context she keeps: significance of network motifs in scientific collaborations. 16:1-16:21 - Pedro Paredes, Pedro Manuel Pinto Ribeiro
:
Rand-FaSE: fast approximate subgraph census. 17:1-17:18 - Adrien Guille
, Cécile Favre:
Event detection, tracking, and visualization in Twitter: a mention-anomaly-based approach. 18:1-18:18 - Shota Saito, Ryota Tomioka, Kenji Yamanishi
:
Early detection of persistent topics in social networks. 19:1-19:15 - Günce Keziban Orman
, Vincent Labatut
, Marc Plantevit
, Jean-François Boulicaut:
Interpreting communities based on the evolution of a dynamic attributed network. 20:1-20:22 - R. Chulaka Gunasekara
, Kishan G. Mehrotra, Chilukuri K. Mohan:
Multi-objective optimization to identify key players in large social networks. 21:1-21:20 - Adham Beykikhoshk, Ognjen Arandjelovic
, Dinh Q. Phung
, Svetha Venkatesh
, Terry Caelli
:
Using Twitter to learn about the autism community. 22:1-22:17 - Michael Brutz, François G. Meyer
:
A flexible multiscale approach to overlapping community detection. 23:1-23:17 - Vasudev Bhat, Adheesh Gokhale, Ravi Jadhav, Jagat Sastry Pudipeddi, Leman Akoglu:
Effects of tag usage on question response time - Analysis and prediction in StackOverflow. 24:1-24:13 - Stefano Faralli
, Giovanni Stilo, Paola Velardi
:
Recommendation of microblog users based on hierarchical interest profiles. 25:1-25:23 - Nicolas Dugué
, Vincent Labatut
, Anthony Perez:
A community role approach to assess social capitalists visibility in the Twitter network. 26:1-26:13 - Zide Meng, Fabien Gandon
, Catherine Faron-Zucker
, Ge Song:
Detecting topics and overlapping communities in question and answer sites. 27:1-27:17 - Dimitrios Kotsakos, Panos Sakkos, Ioannis Katakis
, Dimitrios Gunopulos
:
Language agnostic meme-filtering for hashtag-based social network analysis. 28:1-28:14 - Faraz Zaidi, Mohammad Qasim Pasta, Arnaud Sallaberry
, Guy Melançon
:
Social ties, homophily and extraversion-introversion to generate complex networks. 29:1-29:12 - Yi-Shin Chen, Yi-Cheng Peng, Jheng-He Liang, Elvis Saravia, Fernando Calderon, Chung-Hao Chang, Ya-Ting Chuang, Tzu-Lung Chen, Elizabeth Kwan:
Concept-based event identification from social streams using evolving social graph sequences. 30:1-30:16 - Pranav Thulasiram Bhat, Rohit Varkey Thankachan, K. Chandrasekaran
:
Sharding distributed social databases using social network analysis. 31:1-31:11 - Jalal S. Alowibdi, Ugo A. Buy, Philip S. Yu, Sohaib Ghani, Mohamed F. Mokbel:
Deception detection in Twitter. 32:1-32:16 - Giles Oatley
, Tom Crick
:
Measuring UK crime gangs: a social network problem. 33:1-33:16 - Mahnaz Roshanaei, Shivakant Mishra:
Studying the attributes of users in Twitter considering their emotional states. 34:1-34:13 - Walid Magdy
, Hassan Sajjad
, Tarek El-Ganainy, Fabrizio Sebastiani
:
Bridging social media via distant supervision. 35:1-35:12 - Wolfgang Eugen Schlauch, Emoke-Ágnes Horvát, Katharina Anna Zweig:
Different flavors of randomness: comparing random graph models with fixed degree sequences. 36:1-36:14 - Bryan Ek, Caitlin VerSchneider, Nathan D. Cahill, Darren A. Narayan:
A comprehensive comparison of graph theory metrics for social networks. 37:1-37:7 - Rocío Abascal-Mena
, Rose Lema, Florence Sèdes
:
Detecting sociosemantic communities by applying social network analysis in tweets. 38:1-38:17 - Carlos Sarraute
, Jorge Brea, Javier Burroni, Pablo Blanc:
Inference of demographic attributes based on mobile phone usage patterns and social network topology. 39:1-39:18 - Mingming Chen, Boleslaw K. Szymanski
:
Fuzzy overlapping community quality metrics. 40:1-40:14 - Rui Fan, Jichang Zhao
, Ke Xu:
Topic dynamics in Weibo: a comprehensive study. 41:1-41:15 - Christoph Trattner
, Michael Steurer:
Detecting partnership in location-based and online social networks. 42:1-42:15 - Rémy Cazabet
, Hideaki Takeda
, Masahiro Hamasaki:
Characterizing the nature of interactions for cooperative creation in online social networks. 43:1-43:17 - Bruno Vicente Alves de Lima, Vinícius Ponte Machado
, Lucas A. Lopes:
Automatic labeling of social network users Scientia.Net through the machine learning supervised application. 44:1-44:10 - Tai-Chi Wang, Frederick Kin Hing Phoa, Tun-Chieh Hsu:
Power-law distributions of attributes in community detection. 45:1-45:10 - Andrea Tagarelli
, Roberto Interdonato
:
Time-aware analysis and ranking of lurkers in social networks. 46:1-46:23 - Maha Ben Kraiem, Jamel Feki, Kaïs Khrouf
, Franck Ravat
, Olivier Teste
:
Modeling and OLAPing social media: the case of Twitter. 47:1-47:15 - Kent Wickstrøm Jensen
, Thomas Schott
:
Start-up firms' networks for innovation and export: facilitated and constrained by entrepreneurs' networking in private and public spheres. 48:1-48:17 - Derek Doran:
On the discovery of social roles in large scale social systems. 49:1-49:18 - Yuming Lin, Xiaoling Wang, You Li, Aoying Zhou:
Integrating the optimal classifier set for sentiment analysis. 50:1-50:13 - Sarah Bouraga
, Ivan Jureta, Stéphane Faulkner:
An empirical study of notifications' importance for online social network users. 51:1-51:34 - Dongjin Song, David A. Meyer:
Link sign prediction and ranking in signed directed social networks. 52:1-52:14 - George A. Barnett, Ke Jiang, Jesse R. Hammond:
Using coherencies to examine network evolution and co-evolution. 53:1-53:11 - Sigal Sina, Avi Rosenfeld, Sarit Kraus:
SAMI: an algorithm for solving the missing node problem using structure and attribute information. 54:1-54:20 - Mehdi Kaytoue, Yoann Pitarch, Marc Plantevit
, Céline Robardet:
What effects topological changes in dynamic graphs? - Elucidating relationships between vertex attributes and the graph structure. 55:1-55:17 - Afra Abnar
, Mansoureh Takaffoli, Reihaneh Rabbany, Osmar R. Zaïane:
SSRM: structural social role mining for dynamic social networks. 56:1-56:18 - Siddharth Bora, Harvineet Singh, Anirban Sen, Amitabha Bagchi, Parag Singla:
On the role of conductance, geography and topology in predicting hashtag virality. 57:1-57:15 - Stéphan Clémençon, Héctor de Arazoza, Fabrice Rossi
, Viet-Chi Tran
:
A statistical network analysis of the HIV/AIDS epidemics in Cuba. 58:1-58:14 - Amina Madani, Omar Boussaid, Djamel Eddine Zegour:
Real-time trending topics detection and description from Twitter content. 59:1-59:13 - Jacob Dijkstra:
Social exchange: relations and networks. 60:1-60:3 - Srinka Basu, Ujjwal Maulik
:
Community detection based on strong Nash stable graph partition. 61:1-61:15 - Alireza Farasat, Alexander G. Nikolaev, Sargur N. Srihari, Rachael Hageman Blair:
Probabilistic graphical models in modern social network analysis. 62:1-62:18 - Saber Shokat Fadaee, Mehrdad Farajtabar, Ravi Sundaram, Javed A. Aslam, Nikos I. Passas
:
On the network you keep: analyzing persons of interest using Cliqster. 63:1-63:14 - Erick Stattner:
Involvement of node attributes in the link formation process into a telecommunication network. 64:1-64:11 - Ahmed Al Dhanhani, Rabeb Mizouni
, Hadi Otrok
, Ahmad Al-Rubaie:
Analysis of collaborative learning in social network sites used in education. 65:1-65:18 - Ajitesh Srivastava, Charalampos Chelmis
, Viktor K. Prasanna:
The unified model of social influence and its application in influence maximization. 66:1-66:15 - Conny Kühne, Klemens Böhm:
Protecting the Dawid-Skene algorithm against low-competence raters and collusion attacks with gold-selection strategies. 67:1-67:25 - Mohamed Nader Jelassi, Sadok Ben Yahia
, Engelbert Mephu Nguifo
:
Towards more targeted recommendations in folksonomies. 68:1-68:18

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.