default search action
CASoN 2012: Sao Carlos, Brazil
- Fourth International Conference on Computational Aspects of Social Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012. IEEE 2012, ISBN 978-1-4673-4793-8
- Fuad Khan Baloch, Brian Cusack:
A discussion on Internet Governance. 1-7 - Catherine Bernard, Hervé Debar, Salim Benayoune:
Cross-domain vulnerabilities over social networks. 8-13 - Lilian Berton, Alneu de Andrade Lopes:
Informativity-based graph: Exploring mutual kNN and labeled vertices for semi-supervised learning. 14-19 - Radoslaw Brendel, Henryk Krawczyk:
Primary role identification in e-mail networks using pattern subgraphs and sequence diagrams. 20-25 - Sarvenaz Choobdar, Pedro Manuel Pinto Ribeiro, Fernando M. A. Silva:
Event detection in evolving networks. 26-32 - Colin Cooper, Tomasz Radzik, Yiannis Siantos:
Estimating network parameters using random walks. 33-40 - Bogdan Gliwa, Anna Zygmunt, Aleksander Byrski:
Graphical analysis of social group dynamics. 41-46 - Yoonjae Lee, Junseok Oh, Bong Gyou Lee:
Logical push framework for real-time SNS processing. 47-51 - Ana Carolina E. S. Lima, Leandro Nunes de Castro:
Automatic sentiment analysis of Twitter messages. 52-57 - Bruno Vicente Alves de Lima, Vinícius Ponte Machado:
Machine learning algorithms applied in automatic classification of social network users. 58-62 - Debanjan Mahata, Nitin Agarwal:
What does everybody know? Identifying event-specific sources from social media. 63-68 - Radoslaw Michalski, Piotr Bródka, Przemyslaw Kazienko, Krzysztof Juszczyszyn:
Quantifying social network dynamics. 69-74 - Nils Ever Murrugarra-Llerena, Lilian Berton, Alneu de Andrade Lopes:
Graph-based cross-validated committees ensembles. 75-80 - Soo Kyung Park, Jeong Ho Kwak, Bong Gyou Lee:
Is ARPU1; the right choice for wireless data-based communication services? 81-86 - Alysson Bolognesi Prado, Maria Cecília Calani Baranauskas:
Representing scientific associations through the lens of Actor-Network Theory. 87-92 - Martin Radvanský, Milos Kudelka, Václav Snásel:
Detection of head experts in social network. 93-98 - Atta-ur-Rahman:
Performance of Modified Iterative Decoding Algorithm for Multilevel codes. 99-104 - Fatih Sen, Rolf T. Wigand, Nitin Agarwal, Debanjan Mahata, Halil Bisgin:
Identifying focal patterns in social networks. 105-108 - Layth Sliman, Benoit Charroux, Yvan Stroppa:
RunMyCode: An innovative platform for social production and evaluation of scientific research. 109-114 - Mohammad Soleimani-Pouri, Alireza Rezvanian, Mohammad Reza Meybodi:
Solving maximum clique problem in stochastic graphs using learning automata. 115-119 - Syed Khairuzzaman Tanbeer, Carson Kai-Sang Leung, Juan J. Cameron:
DIFSoN: Discovering influential friends from social networks. 120-125 - B. K. Tripathy, Anirban Mitra:
An algorithm to achieve k-anonymity and l-diversity anonymisation in social networks. 126-131 - Jorge Carlos Valverde-Rebaza, Alneu de Andrade Lopes:
Structural link prediction using community information on Twitter. 132-137 - Katarzyna Wegrzyn-Wolska, Lamine Bougueroua:
Tweets mining for French Presidential Election. 138-143 - Rolf T. Wigand, Nitin Agarwal, O. Isaac Osesina, Winfried Hering, M. Audrey Korsgaard, Arnold Picot, Marcus A. Drescher:
Social network indices as performance predictors in a virtual organization. 144-149 - Dante Zaupa, Cristiano André da Costa, Jessica Silva, Jorge L. V. Barbosa, Adenauer C. Yamin:
Mingle spontaneous social network. 150-154 - Sarka Zehnalova, Milos Kudelka Jr., Milos Kudelka, Václav Snásel:
Comparing two local methods for community detection in social networks. 155-160 - Lisa Ziemer, Tina Stahlschmidt, Norbert Kuhn:
Social media in the context of academic marketing: Case study: Evaluation of the Umwelt-Campus campaign. 161-166 - Ohood Saud Althobaiti, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Biometric access control for wireless nodes. 167-174 - Dherik Barison, Rodrigo Sanches Miani, Bruno Bogaz Zarpelão, Gean Davis Breda, Leonardo de Souza Mendes:
Evaluation of quality in encrypted VoIP calls. 175-180 - Kelton A. P. Costa, Clayton R. Pereira, Rodrigo Nakamura, Luís A. M. Pereira, João Paulo Papa:
Boosting Optimum-Path Forest clustering through harmony Search and its applications for intrusion detection in computer networks. 181-185 - Dellys Hachemi Nabil, Karima Benatchba, Mouloud Koudil, Ahmed Bouridane:
Threats models on biometric systems: A comparative study. 186-191 - Loredana Liccardo, Massimiliano Rak, Giuseppe Di Modica, Orazio Tomarchio:
Ontology-based Negotiation of security requirements in cloud. 192-197 - Joel Gibson, Robin Rondeau, Darren Eveleigh, Qing Tan:
Benefits and challenges of three cloud computing service models. 198-205 - Antonio Cuomo, Franco Frattolillo, Federica Landolfi, Umberto Villano:
A simple and secure watermarking protocol. 206-211 - Ruben Jonathan Garcia Vargas, Eleazar Aguirre Anaya, Ramon Galeana Huerta, Alba Felix Moreno Hernandez:
Security controls for Android. 212-216 - Umesh Hodeghatta Rao Xavier, Bishwa Prakash Pati:
Study of internet security threats among home users. 217-221 - Aderonke Ikuomola, Adesina Simon Sodiya:
A credible cost-sensitive model for intrusion response selection. 222-227 - Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
Securing password recovery through dispersion. 228-233 - Muhammad Khurram Khan, Saru Kumari, Mridul Kumar Gupta:
Further cryptanalysis of 'A remote authentication scheme using mobile device'. 234-237 - Reine Lundin, Stefan Lindskog:
An investigation of entropy of selectively encrypted bitmap images. 238-243 - Massimo Ficco, Massimiliano Rak, Beniamino Di Martino:
An intrusion detection framework for supporting SLA assessment in Cloud Computing. 244-249 - Nader Nassar, G. Miller:
Method for a two dimensional honeypot to deter web bots in commerce systems. 250-256 - Ebenezer Paintsil:
Taxonomy of security risk assessment approaches for researchers. 257-262 - Michal Prilepok, Tomás Jezowicz, Jan Platos, Václav Snásel:
Spam detection using compression and PSO. 263-270 - Murad A. Rassam, Anazida Zainal, Mohd Aizaini Maarof:
One-Class Principal Component Classifier for anomaly detection in wireless sensor network. 271-276 - Hana Rezanková, Dusan Húsek:
Fuzzy clustering: Determining the number of clusters. 277-282 - Adesina S. Sodiya, Dada O. Aborisade, Aderonke Justina Ikuomola:
A survivability model for object-oriented software systems. 283-290 - Enrico Sorio, Alberto Bartoli, Eric Medvet:
A look at hidden web pages in Italian public administrations. 291-296 - Frank Yeong-Sung Lin, Yu-Shun Wang, Jing-Wei Wang, Chi-Hsiang Chan:
Effective network defense strategies to maximize system survivability of wireless mesh networks under malicious and jamming attacks. 297-302 - Bernd Zwattendorfer, Ivo Sumelong, Herbert Leitold:
Middleware architecture for cross-border eID. 303-308 - Sanchika Gupta, Padam Kumar, Anjali Sardana, Ajith Abraham:
A fingerprinting system calls approach for intrusion detection in a cloud environment. 309-314 - Sanchika Gupta, Padam Kumar, Anjali Sardana, Ajith Abraham:
A secure and lightweight approach for critical data security in cloud. 315-320 - Hmood Al-Dossari:
A reputation-based approach for consumer protection in Saudi Arabia. 321-326 - Brahim Batouche, Damien Nicolas, Hedi Ayed, Djamel Khadraoui:
Recommendation of travelling plan for elderly people according to their abilities and preferences. 327-332 - Evandro Caldeira, Gabriel Brandão, Adriano César Machado Pereira:
Characterizing and preventing chargebacks in next generation web payments services. 333-338 - Sandir R. Campos, Ararigleno Almeida Fernandes, Rafael T. de Sousa Jr., Edison Pignaton de Freitas, João Paulo Carvalho Lustosa da Costa, Antonio Manuel Rubio Serrano, Daniel Da C. Rodrigues, Clauber T. Rodrigues:
Ontologic audit trails mapping for detection of irregularities in payrolls. 339-344 - Ulisses Cavalca, Caio Mário Mesquita, Adriano César Machado Pereira, Eduardo G. Carrano:
A methodology for traffic shaping multiobjective optimization for next generation network. 345-350 - Milena Janáková:
Quality of service & process control: What is their efficiency in available IT products? 351-355 - Jonas Krutil, Milos Kudelka, Václav Snásel:
Web page classification based on Schema.org collection. 356-360 - Kun Ma, Runyuan Sun, Ajith Abraham:
Toward a lightweight framework for monitoring public clouds. 361-365 - Sanjay Kumar Malik, Syed Afzal Murtaza Rizvi:
Ontology design towards web intelligence: A Sports Complex Ontology case study. 366-371 - George Markou, Ioannis Refanidis:
Towards an automatic non-deterministic web Service Composition platform. 372-377 - Miguel L. Pardal, Mark Harrison, Sanjay E. Sarma, José Alves Marques:
Performance assessment of XACML authorizations for Supply Chain Traceability Web Services. 378-383 - Jan Platos, Pavel Krömer, Václav Snásel, Ajith Abraham:
Searching similar images - Vector quantization with S-tree. 384-388 - Haroldo Maria Teixeira Filho, Leonardo Guerreiro Azevedo:
CommonGOV: A consolidate approach for governance of service-oriented architecture. 389-394
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.