default search action
Social Network Analysis and Mining, Volume 8
Volume 8, Number 1, December 2018
- Fabrizio Marozzo, Alessandro Bessi:
Analyzing polarization of social media users and news sites during political campaigns. 1:1-1:13 - Ehsan Mohammady Ardehaly, Aron Culotta:
Learning from noisy label proportions for classifying online social data. 2:1-2:18 - Tjeerd van Campen, Herbert Hamers, Bart Husslage, Roy Lindelauf:
A new approximation method for the Shapley value applied to the WTC 9/11 terrorist attack. 3:1-3:12 - Pin-Yu Chen, Baichuan Zhang, Mohammad Al Hasan:
Incremental eigenpair computation for graph Laplacian matrices: theory and applications. 4:1-4:17 - Fabrício Olivetti de França, Denise Hideko Goya, Claudio Luis de Camargo Penteado:
User profiling of the Twitter Social Network during the impeachment of Brazilian President. 5 - Elisa Mussumeci, Flávio Codeço Coelho:
Reconstructing news spread networks and studying its dynamics. 6 - Soumi Dutta, Sujata Ghatak, Ratnadeep Dey, Asit Kumar Das, Saptarshi Ghosh:
Attribute selection for improving spam classification in online social networks: a rough set theory-based approach. 7 - Ilhem Feddaoui, Faîçal Felhi, Jalel Akaichi:
Multidimensional user profile construction for Web services selection: social networks case study. 8 - Yannick Léo, Márton Karsai, Carlos Sarraute, Eric Fleury:
Correlations and dynamics of consumption patterns in social-economic networks. 9 - Jing Tang, Xueyan Tang, Junsong Yuan:
An efficient and effective hop-based approach for influence maximization in social networks. 10 - Nagendra Kumar, Gopi Ande, Jessu Shirish Kumar, Manish Singh:
Toward maximizing the visibility of content in social media brand pages: a temporal analysis. 11 - Despoina Antonakaki, Sotiris Ioannidis, Paraskevi Fragopoulou:
Utilizing the average node degree to assess the temporal growth rate of Twitter. 12 - Kousik Das, Sovan Samanta, Madhumangal Pal:
Study on centrality measures in social networks: a survey. 13 - Alexander Strang, Oliver Haynes, Nathan D. Cahill, Darren A. Narayan:
Generalized relationships between characteristic path length, efficiency, clustering coefficients, and density. 14 - Pivithuru Wijegunawardana, Vatsal Ojha, Ralucca Gera, Sucheta Soundarajan:
Sampling dark networks to locate people of interest. 15 - Vachik S. Dave, Mohammad Al Hasan, Baichuan Zhang, Chandan K. Reddy:
Predicting interval time for reciprocal link creation using survival analysis. 16 - Yike Liu, Tara Safavi, Neil Shah, Danai Koutra:
Reducing large graphs to small supergraphs: a unified approach. 17 - Yasin N. Silva, Deborah L. Hall, Christopher Rich:
BullyBlocker: toward an interdisciplinary approach to identify cyberbullying. 18 - Jooyoung Lee, Rasheed Hussain, Victor Rivera, Davlatbek Isroilov:
Second-level degree-based entity resolution in online social networks. 19 - Patricia Conde Céspedes, Blaise Ngonmang, Emmanuel Viennet:
An efficient method for mining the maximal α-quasi-clique-community of a given node in complex networks. 20 - Germán Creamer, Bernardo Creamer:
Emissions abating technology adoption in a coal trading network. 21 - Supattana Sukrat, Borworn Papasratorn:
An architectural framework for developing a recommendation system to enhance vendors' capability in C2C social commerce. 22 - Mohammad Ghane'i-Ostad, Hamed Vahdat-Nejad, Majid Abdolrazzagh-Nezhad:
Detecting overlapping communities in LBSNs by fuzzy subtractive clustering. 23 - Xiaotao Gu, Hong Yang, Jie Tang, Jing Zhang, Fanjin Zhang, Debing Liu, Wendy Hall, Xiao Fu:
Profiling Web users using big data. 24 - Haeran Cho, Yi Yu:
Link prediction for interdisciplinary collaboration via co-authorship network. 25 - Eisha Nathan, David A. Bader:
Incrementally updating Katz centrality in dynamic graphs. 26 - Dima Kagan, Yuval Elovici, Michael Fire:
Generic anomalous vertices detection utilizing a link prediction algorithm. 27 - Kashfia Sailunaz, Manmeet Dhaliwal, Jon G. Rokne, Reda Alhajj:
Emotion detection from text and speech: a survey. 28:1-28:26 - Taufik Sutanto, Richi Nayak:
Fine-grained document clustering via ranking and its application to social media analytics. 29:1-29:19 - Hiba Sebei, Mohamed Ali Hadj Taieb, Mohamed Ben Aouicha:
Review of social media analytics process and Big Data pipeline. 30:1-30:28 - Andreea Nita, Cristiana Maria Ciocanea, Steluta Manolache, Laurentiu Rozylowicz:
A network approach for understanding opportunities and barriers to effective public participation in the management of protected areas. 31:1-31:11 - Negar Emami, Niloofar Mozafari, Ali Hamzeh:
Continuous state online influence maximization in social network. 32:1-32:17 - Hamidreza Mahyar, Rouzbeh Hasheminezhad, Elaheh Ghalebi, Ali Nazemian, Radu Grosu, Ali Movaghar, Hamid R. Rabiee:
Identifying central nodes for information flow in social networks using compressive sensing. 33:1-33:24 - Amin Mahmoudi, Mohd Ridzwan Yaakub, Azuraliza Abu Bakar:
A new method to discretize time to identify the milestones of online social networks. 34:1-34:20 - Maryam Zamanian, Farzaneh Zolala, Ali Akbar Haghdoost, Mohammad Reza Baneshi:
Effect of estimation method, definition of ratio, and the plausible range in estimating social network size. 35:1-35:7 - Sorin Adam Matei, Amani Abu Jabal, Elisa Bertino:
Social-collaborative determinants of content quality in online knowledge production systems: comparing Wikipedia and Stack Overflow. 36:1-36:16 - Sean M. Fitzhugh, Arwen H. DeCostanza:
Procure, persist, perish: communication tie dynamics in a disrupted task environment. 37:1-37:22 - Elaheh Raisi, Bert Huang:
Weakly supervised cyberbullying detection with participant-vocabulary consistency. 38:1-38:17 - Diego Perna, Roberto Interdonato, Andrea Tagarelli:
Learning to lurker rank: an evaluation of learning-to-rank methods for lurking behavior analysis. 39:1-39:21 - Majed Al Zayer, Mehmet Hadi Gunes:
Exploring visual impairment awareness campaigns on Twitter. 40:1-40:16 - Razieh Malekhosseini, Mehdi Hosseinzadeh, Keyvan Navi:
An investigation into the requirements of privacy in social networks and factors contributing to users' concerns about violation of their privacy. 41:1-41:24 - Akrati Saxena, Ralucca Gera, S. R. S. Iyengar:
Estimating degree rank in complex networks. 42:1-42:20 - Hongyi Zhang, Xingyu Niu, Irwin King, Michael R. Lyu:
Overlapping community detection with preference and locality information: a non-negative matrix factorization approach. 43:1-43:14 - Jerry Scripps, Christian Trefftz, Zachary Kurmas:
The difference between optimal and germane communities. 44:1-44:19 - Ahmet Anil Müngen, Mehmet Kaya:
Extracting abstract and keywords from context for academic articles. 45:1-45:11 - Yue Feng, Fattane Zarrinkalam, Ebrahim Bagheri, Hossein Fani, Feras N. Al-Obeidat:
Entity linking of tweets based on dominant entity candidates. 46:1-46:16 - Negar Ahmadi, Rene M. H. Besseling, Mykola Pechenizkiy:
Assessment of visibility graph similarity as a synchronization measure for chaotic, noisy and stochastic time series. 47:1-47:17 - Brian Heredia, Joseph D. Prusa, Taghi M. Khoshgoftaar:
Social media for polling and predicting United States election outcome. 48:1-48:16 - Ahmad Hany Hossny, Terry Moschuo, Grant Osborne, Lewis Mitchell, Nick Lothian:
Enhancing keyword correlation for event detection in social networks using SVD and k-means: Twitter case study. 49:1-49:10 - Sonia Khetarpaul, S. K. Gupta, L. Venkata Subramaniam:
Mining optimal meeting points for moving users in spatio-temporal space. 50:1-50:16 - Yingjie Shi, Xuechang Zhu, Bin Liu, Lei Li:
Social networks and the wages of job seekers: the case of China. 51:1-51:12 - Shuhan Yuan, Xintao Wu, Yang Xiang:
Incorporating pre-training in long short-term memory networks for tweet classification. 52:1-52:16 - Zahra Mousavilou, Rozita Jamili Oskouei:
An optimal method for URL design of webpage journals. 53:1-53:8 - Jisun An, Haewoon Kwak, Soon-Gyo Jung, Joni Salminen, Bernard J. Jansen:
Customer segmentation using online platforms: isolating behavioral and demographic segments for persona creation via aggregated user data. 54:1-54:19 - Yaser Sobhanifard, Ghodrat Allah Balighi:
Emotional modeling of the green purchase intention improvement using the viral marketing in the social networks. 55:1-55:8 - Arif Mohaimin Sadri, Samiul Hasan, Satish V. Ukkusuri, Juan Esteban Suarez Lopez:
Analysis of social interaction network properties and growth on Twitter. 56:1-56:13 - Mohammed Al-Taie, Seifedine Nimer Kadry, Obasa Isiaka Adekunle:
Understanding expert finding systems: domains and techniques. 57:1-57:9 - Monali Bordoloi, Saroj K. Biswas:
Keyword extraction from micro-blogs using collective weight. 58:1-58:16 - Luís Cavique, Nuno C. Marques, António Gonçalves:
A data reduction approach using hypergraphs to visualize communities and brokers in social networks. 60:1-60:17 - Matthieu Latapy, Tiphaine Viard, Clémence Magnien:
Stream graphs and link streams for the modeling of interactions over time. 61:1-61:29 - Ghita Mezzour, Kathleen M. Carley, L. Richard Carley:
Remote assessment of countries' cyber weapon capabilities. 62:1-62:15 - Manika Lamba, Margam Madhusudhan:
Application of sentiment analysis in libraries to provide temporal information service: a case study on various facets of productivity. 63:1-63:12 - Bhavtosh Rath, Wei Gao, Jing Ma, Jaideep Srivastava:
Utilizing computational trust to identify rumor spreaders on Twitter. 64:1-64:16 - Radhika Arava:
Community detection using coordination games. 65:1-65:13 - Rishi Ranjan Singh, S. R. S. Iyengar, Shubham Chaudhary, Manas Agarwal:
An efficient heuristic for betweenness estimation and ordering. 66:1-66:27
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.