- Sponsor:
- sigops
Humans have formed social networks since the dawn of history. Only in the past several years have these networks been represented within computers accessible from anywhere. This is a big change, with vast consequences not yet understood.
For the computer systems researcher, social network systems present special challenges and opportunities. The trust network can be exploited to improve computer systems. New forms of workloads stress existing systems; databases, file systems, computer networks. This workshop provides a forum for researchers to exchange ideas on these topics.
Last year, we noted that social network systems had been neglected by researchers. That is no longer so true. Since our first workshop, a number of other research venues have popped up.
Last year, the majority of our submissions and accepted papers came from North America. This year, we were disappointed to not receive a single submission from that continent. This may be related to poor economic conditions and decreased travel budgets. Fortunately, we did receive thirteen submissions, and from those accepted eight into the workshop. We are pleased with the quality of the final papers and the strength and depth of the program.
The papers are organized into three sessions; personalized search, social graph structure, and privacy and security. Discussion during the workshop ranged across the merits of decentralized versus centralized architectures and designing for privacy.
Despite a tight reviewing schedule, all submissions received at least four reviews from program committee members. Several papers were shepherded to improve their presentation and clarity.
Proceeding Downloads
Toward personalized peer-to-peer top-k processing
We present the first personalized peer-to-peer top-k search protocol for a collaborative tagging system. Each peer maintains relevant personalized information about its tagging behavior as well as that of its social neighbors, and uses those to locally ...
Toward personalized query expansion
Social networking and tagging have taken off at an unexpected scale and speed, opening huge opportunities to enhance the user search experience. We present Gossple, a new, user-centric, approach to improve the exploration of the Internet. Underlying ...
Eight friends are enough: social graph approximation via public listings
The popular social networking website Facebook exposes a "public view" of user profiles to search engines which includes eight of the user's friendship links. We examine what interesting properties of the complete social graph can be inferred from this ...
On the strength of weak ties in mobile social networks
Weak ties, introduced in the seminal paper by Granovetter [6], refer to people's relationships with acquaintances outside their social circle (i.e., acquaintances with which they interact infrequently). We show that weak ties play an important role on ...
Anonymous opinion exchange over untrusted social networks
Social networks are the fastest growing Internet applications. They offer the possibility to get in touch with current friends, discover where the old ones are, and make new ones. While these applications are a great enabler for our social life, they ...
Centralities: capturing the fuzzy notion of importance in social graphs
The increase of interest in the analysis of contemporary social networks, for both academic and economic reasons, has highlighted the inherent difficulties in handling large and complex structures. Among the tools provided by researchers for network ...
Buzztraq: predicting geographical access patterns of social cascades using social networks
Web 2.0 sites have made networked sharing of user generated content increasingly popular. Serving rich-media content with strict delivery constraints requires a distribution infrastructure. Traditional caching and distribution algorithms are optimised ...
PeerSoN: P2P social networking: early experiences and insights
To address privacy concerns over Online Social Networks (OSNs), we propose a distributed, peer-to-peer approach coupled with encryption. Moreover, extending this distributed approach by direct data exchange between user devices removes the strict ...