Abstract is missing.
- Finding Credible Information Sources in Social Networks Based on Content and Social StructureKevin Robert Canini, Bongwon Suh, Peter Pirolli. 1-8 [doi]
- The Impacts of Just-in-Time Social Networks on People's Choices in the Real WorldKwan Hong Lee, Andrew Lippman, Alex Pentland, Elenna R. Dugundji. 9-18 [doi]
- NetVisia: Heat Map & Matrix Visualization of Dynamic Social Network Statistics & ContentRobert Gove, Nick Gramsky, Rose Kirby, Emre Sefer, Awalin Sopan, Cody Dunne, Ben Shneiderman, Meirav Taieb-Maimon. 19-26 [doi]
- Link Prediction Based on Subgraph Evolution in Dynamic Social NetworksKrzysztof Juszczyszyn, Katarzyna Musial, Marcin Budka. 27-34 [doi]
- Overlapping Community Structures and Their Detection on Social NetworksNam P. Nguyen, Thang N. Dinh, Dung T. Nguyen, My T. Thai. 35-40 [doi]
- DNE: A Method for Extracting Cascaded Diffusion Networks from Social NetworksMotahhare Eslami, Hamid R. Rabiee, Mostafa Salehi. 41-48 [doi]
- Predicting Reciprocity in Social NetworksJustin Cheng, Daniel Mauricio Romero, Brendan Meeder, Jon M. Kleinberg. 49-56 [doi]
- An Agent-Based Model of Epidemic Spread Using Human Mobility and Social Network InformationEnrique Frías-Martínez, Graham Williamson, Vanessa Frías-Martínez. 57-64 [doi]
- IRONMAN: Using Social Networks to Add Incentives and Reputation to Opportunistic NetworksGreg Bigwood, Tristan Henderson. 65-72 [doi]
- Link Prediction in Social Networks Using Computationally Efficient Topological FeaturesMichael Fire, Lena Tenenboim, Ofrit Lesser, Rami Puzis, Lior Rokach, Yuval Elovici. 73-80 [doi]
- Social Butterfly: Social Caches for Distributed Social NetworksLu Han, Badri Nath, Liviu Iftode, S. Muthukrishnan. 81-86 [doi]
- Odd Leaf Out: Improving Visual Recognition with GamesDerek L. Hansen, David W. Jacobs, Darcy Lewis, Arijit Biswas, Jennifer Preece, Dana Rotman, Eric Stevens. 87-94 [doi]
- The Life Game: Cognitive Strategies for Repeated Stochastic GamesKan-Leung Cheng, Inon Zuckerman, Dana S. Nau, Jennifer Golbeck. 95-102 [doi]
- Vocal Minority Versus Silent Majority: Discovering the Opionions of the Long TailEni Mustafaraj, Samantha Finn, Carolyn Whitlock, Panagiotis Takis Metaxas. 103-110 [doi]
- Analyzing Answers in Threaded Discussions Using a Role-Based Information NetworkJeon-Hyung Kang, Jihie Kim. 111-117 [doi]
- Coevolving Strategies in Social-Elimination GamesKan-Leung Cheng, Ugur Kuter, Jennifer Golbeck. 118-126 [doi]
- Illicit Bits: Detecting and Analyzing Contraband Networks in Massively Multiplayer Online GamesMuhammad Aurangzeb Ahmad, Brian Keegan, Sophia Sullivan, Dmitri Williams, Jaideep Srivastava, Noshir S. Contractor. 127-134 [doi]
- An Exploratory Study of Player Performance, Motivation, and Enjoyment in Massively Multiplayer Online Role-Playing GamesKyong Jin Shim, Kuo-Wei Hsu, Jaideep Srivastava. 135-140 [doi]
- Dynamics of Social Interactions in a Network GameEunkyung Kim, Luyan Chi, Yu-Han Chang, Rajiv T. Maheswaran. 141-148 [doi]
- Predicting Personality from TwitterJennifer Golbeck, Cristina Robles, Michon Edmondson, Karen Turner. 149-156 [doi]
- Churn Prediction in MMORPGs Using Player Motivation Theories and an Ensemble ApproachZoheb Borbora, Jaideep Srivastava, Kuo-Wei Hsu, Dmitri Williams. 157-164 [doi]
- How (Not) to Predict ElectionsPanagiotis Takis Metaxas, Eni Mustafaraj, Daniel Gayo-Avello. 165-171 [doi]
- The Evolution of Ego-Centric Triads: A Microscopic Approach toward Predicting Macroscopic Network PropertiesMina Doroud, Prantik Bhattacharyya, Shyhtsun Felix Wu, Diane Felmlee. 172-179 [doi]
- Our Twitter Profiles, Our Selves: Predicting Personality with TwitterDaniele Quercia, Michal Kosinski, David Stillwell, Jon Crowcroft. 180-185 [doi]
- Content-Based Prediction of Temporal Boundaries for Events in TwitterAkshaya Iyengar, Tim Finin, Anupam Joshi. 186-191 [doi]
- Predicting the Political Alignment of Twitter UsersMichael Conover, Bruno Gonçalves, Jacob Ratkiewicz, Alessandro Flammini, Filippo Menczer. 192-199 [doi]
- Fortune Monitor or Fortune Teller: Understanding the Connection between Interaction Patterns and Financial StatusWei Pan, Nadav Aharony, Alex Pentland. 200-207 [doi]
- Using Social Sensing to Understand the Links between Sleep, Mood, and SociabilitySai T. Moturu, Inas Khayal, Nadav Aharony, Wei Pan, Alex Pentland. 208-214 [doi]
- Leveraging User Diversity to Harvest Knowledge on the Social WebJeon-Hyung Kang, Kristina Lerman. 215-222 [doi]
- The Connected States of America: Quantifying Social Radii of InfluenceFrancesco Calabrese, Dominik Dahlem, Alexandre Gerber, DeDe Paul, Xiaoji Chen, James Rowland, Christopher Rath, Carlo Ratti. 223-230 [doi]
- The Need for Champions for Approximate Social SearchYves-Alexandre de Montjoye, Jesika Haria, Manuel Cebrián, Alex Pentland. 231-234 [doi]
- Effectiveness of Cooperative Customer Navigation from Robots around a Retail ShopKoji Kamei, Tetsushi Ikeda, Hiroyuki Kidokoro, Masayuki Shiomi, Akira Utsumi, Kazuhiko Shinozawa, Takahiro Miyashita, Norihiro Hagita. 235-241 [doi]
- Unveiling Hidden Patterns to Find Social RelevanceEnkh-Amgalan Baatarjav, Ram Dantu. 242-249 [doi]
- Profile Mining in CVS-Logs and Face-to-Face Contacts for Recommending Software DevelopersBjoern Elmar Macek, Martin Atzmueller, Gerd Stumme. 250-257 [doi]
- Triangles to Capture Social CohesionAdrien Friggeri, Guillaume Chelius, Eric Fleury. 258-265 [doi]
- Are Humans Like Ants? - Analyzing Collective Opinion Formation in Online DiscussionsCarolin Kaiser, Alexander Piazza, Johannes Kröckel, Freimut Bodendorf. 266-273 [doi]
- Get Online Support, Feel Better - Sentiment Analysis and Dynamics in an Online Cancer Survivor CommunityBaojun Qiu, Kang Zhao, Prasenjit Mitra, Dinghao Wu, Cornelia Caragea, John Yen, Greta E. Greer, Kenneth Portier. 274-281 [doi]
- Network-Centric Recommendation: Personalization with and in Social NetworksAmit Sharma, Dan Cosley. 282-289 [doi]
- Towards Computational Proxemics: Inferring Social Relations from Interpersonal DistancesMarco Cristani, Giulia Paggetti, Alessandro Vinciarelli, Loris Bazzani, Gloria Menegaz, Vittorio Murino. 290-297 [doi]
- Comparing Twitter Summarization Algorithms for Multiple Post SummariesDavid Inouye, Jugal K. Kalita. 298-306 [doi]
- In the Mood for Being Influential on TwitterDaniele Quercia, Jonathan Ellis, Licia Capra, Jon Crowcroft. 307-314 [doi]
- Anticipating Discussion Activity on Community ForumsMatthew Rowe, Sofia Angeletou, Harith Alani. 315-322 [doi]
- Measuring Opinion Relevance in Latent Topic SpaceWei Cheng, Xiaochuan Ni, Jian-Tao Sun, Xiaoming Jin, Hye-Chung Kum, Xiang Zhang, Wei Wang 0010. 323-330 [doi]
- Group Membership and Diffusion in Virtual WorldsDavid A. Huffaker, ChunYuen Teng, Matthew P. Simmons, Liuling Gong, Lada A. Adamic. 331-338 [doi]
- Anti-preferential Attachment: If I Follow You, Will You Follow Me?Juan Lang, Shyhtsun Felix Wu. 339-346 [doi]
- The Role of (Non-)Conformism in Rating PlatformsChih-Chun Chen, Camille Roth. 347-353 [doi]
- Group-in-a-Box Layout for Multi-faceted Analysis of CommunitiesEduarda Mendes Rodrigues, Natasa Milic-Frayling, Marc A. Smith, Ben Shneiderman, Derek L. Hansen. 354-361 [doi]
- Modeling Information Diffusion in Networks with Unobserved LinksQuang Duong, Michael P. Wellman, Satinder P. Singh. 362-369 [doi]
- Read What You Trust: An Open Wiki Model Enhanced by Social ContextHaifeng Zhao, William Kallander, Tometi Gbedema, Henric Johnson, Shyhtsun Felix Wu. 370-379 [doi]
- Game Theoretic Modeling and Computational Analysis of N-Player Conflicts over ResourcesNoam Hazon, Nilanjan Chakraborty, Katia P. Sycara. 380-387 [doi]
- Expert-Driven Topical Classification of Short Message StreamsKrishna Yeswanth Kamath, James Caverlee. 388-393 [doi]
- RESCOT: Reliable Scheduling of Social Computing TasksSergej Sizov. 394-401 [doi]
- The Influence of Distance, Time, and Communication Network Structures on the Choice of Communication PartnersChristoph Stadtfeld, Andreas Geyer-Schulz, Otto Allmendinger. 402-409 [doi]
- Aborting a Message Flowing through Social CommunitiesCindy Hui, Malik Magdon-Ismail, William A. Wallace, Mark K. Goldberg. 410-417 [doi]
- Predicting Trust and Distrust in Social NetworksThomas DuBois, Jennifer Golbeck, Aravind Srinivasan. 418-424 [doi]
- Defending Multiple-User-Multiple-Target Attacks in Online Reputation SystemsYuhong Liu, Yan Lindsay Sun, Ting Yu. 425-434 [doi]
- Models of Web Page Reputation in Social SearchKevin McNally, Michael P. O'Mahony, Barry Smyth. 435-442 [doi]
- Relationship Privacy Preservation in Publishing Online Social NetworksNa Li, Nan Zhang, Sajal K. Das. 443-450 [doi]
- Caretaker: A Social Game for Studying Trust DynamicsNicholas Violi, Jennifer Golbeck, Kan-Leung Cheng, Ugur Kuter. 451-456 [doi]
- From Privacy Concern to Uses of Social Network Sites: A Cultural Comparison via User SurveyHo Keung Tsoi, Li Chen. 457-464 [doi]
- Tie Formation on Twitter: Homophily and Structure of Egocentric NetworksMunmun De Choudhury. 465-470 [doi]
- Two-Layered Structure of Social Network Revealed by Data Analysis of Telecommunciation ServicesHideyuki Koto, Hajime Nakamura, Masaki Aida. 471-476 [doi]
- Cross-Pollination of Information in Online Social Media: A Case Study on Popular Social NetworksParidhi Jain, Tiago Rodrigues, Gabriel Magno, Ponnurangam Kumaraguru, Virgilio Almeida. 477-482 [doi]
- Emotions in Product Reviews-Empirics and ModelsDavid Garcia, Frank Schweitzer. 483-488 [doi]
- Empirical Comparison of Information Spreading Algorithms in the Presence of 1-WhiskersKazem Jahanbakhsh, Valerie King, Gholamali C. Shoja. 489-492 [doi]
- Enabling Cross-Site Content Sharing between Social NetworksMoonam Ko, Hakim Touati, Mohamed Shehab. 493-496 [doi]
- Modelling Influence in a Social Network: Metrics and EvaluationBehnam Hajian, Tony White. 497-500 [doi]
- Finding Event-Specific Influencers in Dynamic Social NetworksChristopher B. Schenk, Douglas C. Sicker. 501-504 [doi]
- Recommendations Based on User-Generated Comments in Social MediaAndrew Messenger, Jon Whittle. 505-508 [doi]
- A Dynamic Community Creation Mechanism in Opportunistic Mobile Social NetworksDaqing Zhang, Zhu Wang, Bin Guo, Xingshe Zhou, Vaskar Raychoudhury. 509-514 [doi]
- Out of Sight Out of Mind-How Our Mobile Social Network Changes during MigrationSanti Phithakkitnukoon, Francesco Calabrese, Zbigniew Smoreda, Carlo Ratti. 515-520 [doi]
- VisionBlocks: A Social Computer Vision FrameworkAbhijit Bendale, Kevin Chiu, Kshitij Marwah, Ramesh Raskar. 521-526 [doi]
- Connecting People in the Workplace through Ephemeral Social NetworksAlvin Chin, Hao Wang, Bin Xu, Ke Zhang, Hao Wang, Lijun Zhu. 527-530 [doi]
- Social Networking Analysis: A State of the Art and the Effect of SemanticsCharalampos Chelmis, Viktor K. Prasanna. 531-536 [doi]
- Data Mining in On-Line Social Network for Marketing Response AnalysisJerzy Surma, Anna Furmanek. 537-540 [doi]
- From Earthquakes to "#morecowbell": Identifying Sub-topics in Social Network CommunicationsAlana Platt, Cynthia Hood, Levi Citrin. 541-544 [doi]
- Groups in Academic Social Networking Services-An Exploration of Their Potential as a Platform for Multi-disciplinary CollaborationJung Sun Oh, Wei Jeng. 545-548 [doi]
- Visual Analysis of Temporal Trends in Social Networks Using Edge Color Coding and Metric TimelinesUdayan Khurana, Viet-An Nguyen, Hsueh-Chien Cheng, Jae-wook Ahn, Xi (Stephen) Chen, Ben Shneiderman. 549-554 [doi]
- Collaboration Emergence in Social Networks with Informational Natural SelectionDaniel S. Farenzena, Ricardo M. Araujo, Luís C. Lamb. 555-559 [doi]
- Labeled Influence Maximization in Social Networks for Target MarketingFa-Hsien Li, Cheng-Te Li, Man-Kwan Shan. 560-563 [doi]
- Social Network ModelsWhitman Richards. 564-567 [doi]
- Detecting Ambiguous Author Names in Crowdsourced Scholarly DataXiaoling Sun, Jasleen Kaur, Lino Possamai, Filippo Menczer. 568-571 [doi]
- Enhancing Mobile Malware Detection with Social CollaborationLiu Yang, Vinod Ganapathy, Liviu Iftode. 572-576 [doi]
- LICOD: Leaders Identification for Community Detection in Complex NetworksRushed Kanawati. 577-582 [doi]
- Design Issues in Minimizing Infrastructure Requirements of Mobile Social Software Introduction SystemSava Stakic, Srdjan Stakic. 583-586 [doi]
- MET: Multi-party E-Commerce Transaction ModelKeren Jin, Jiafeng Zhu, Guangbin Fan. 587-590 [doi]
- Snag'em: Creating Community Connections through GamesEve Powell, Felesia Stukes, Tiffany Barnes, Heather Richter Lipford. 591-594 [doi]
- Urban Radar: An Enabler for Place-Aware Spontaneous InteractionsByoungoh Kim, Gonzalo Huerta Cánepa, Dongman Lee. 595-598 [doi]
- Towards a Generic Socio-cultural Profile for Collaborative EnvironmentsOuamani Fadoua, Narjès Bellamine-Ben Saoud, Henda Hajjami Ben Ghézala. 599-602 [doi]
- Dynamic Community Detection with Temporal Dirichlet ProcessXuning Tang, Christopher C. Yang. 603-608 [doi]
- A Proposed Model to Include Social and Emotional Context in a Group Idea Generation Support SystemJoão Laranjeira, Goreti Marreiros, Carlos Filipe Freitas, Ricardo Santos, João Carneiro, Carlos Ramos. 609-612 [doi]
- Predicting Levels of Rapport in Dyadic Interactions through Automatic Detection of Posture and Posture CongruenceJuan Lorenzo Hagad, Roberto S. Legaspi, Masayuki Numao, Merlin Suarez. 613-616 [doi]
- An Exploratory Study of Player and Team Performance in Multiplayer First-Person-Shooter GamesKyong Jin Shim, Kuo-Wei Hsu, Samarth Damania, Colin DeLong, Jaideep Srivastava. 617-620 [doi]
- Exploring the Spatiality of Networked Social Media as the Third SpaceChamari Priyange Edirisinghe, Adrian David Cheok, Ryohei Nakatsu, Johannes Widodo. 621-624 [doi]
- Social Event Detection in Massive Mobile Phone Data Using Probabilistic Location InferenceVincent A. Traag, Arnaud Browet, Francesco Calabrese, Frédéric Morlot. 625-628 [doi]
- Identification of Groups in Online Environments: The Twist and Turns of Grouping GroupsIftekhar Ahmed, Channing Brown, Andrew Pilny, Y. Dora Cai, Yannick Atouba Ada, Marshall Scott Poole. 629-632 [doi]
- A Semantic Tag Recommendation Framework for Collaborative Tagging SystemsZinovia I. Alepidou, Konstantinos N. Vavliakis, Pericles A. Mitkas. 633-636 [doi]
- Social Distance Drives the Convergence of Preferences in an Online Music Sharing NetworkLily Tran, Manuel Cebrián, Coco Krumme, Alex Pentland. 637-640 [doi]
- Coalescing Twitter Trends: The Under-Utilization of Machine Learning in Social MediaMichael Brennan, Rachel Greenstadt. 641-646 [doi]
- Cognitive Efficiency as a Causal Mechanism for Social PreferencesNisheeth Srivastava, Paul R. Schrater. 647-650 [doi]
- Visualizing the Blogosphere with BlogConnectJustus F. M. Broß, Patrick Schilf, Maximilian Jenders, Christoph Meinel. 651-656 [doi]
- A Temporal Analysis of Geographical Distances in Computer Science CollaborationsPramod Divakarmurthy, Pooja Biswas, Ronaldo Menezes. 657-660 [doi]
- Supervised Rank Aggregation for Predicting Influencers in TwitterKarthik Subbian, Prem Melville. 661-665 [doi]
- How Network Structure Affects Social CreativitySiddhartha Bhattacharyya, Stellan Ohlsson. 666-671 [doi]
- Mapping the Blogosphere-Towards a Universal and Scalable Blog-CrawlerPhilipp Berger, Patrick Hennig, Justus Bross, Christoph Meinel. 672-677 [doi]
- Live Broadcasting-The Feeling of Presence and Social InteractionAnneli Avatare Nou, Marie Sjölinder. 678-683 [doi]
- Link Bias in Network Formation GamesShaun Lichter, Terry L. Friesz, Christopher Griffin. 684-687 [doi]
- Top-K Algorithm for Recommendation in Social Networking KingdomsJustin Zhan, Nadia M. Jones, Michael D. Purnell. 688-694 [doi]
- Anomaly Detection in Social-Economic ComputingJustin Zhan, Xing Fang. 695-703 [doi]
- Anomaly Detection on Collective Moving Patterns: Manifold Learning Based Analysis of Traffic StreamsSu Yang, Wenbin Zhou. 704-707 [doi]
- Task-Based Services Composition for Ubiquitous ComputingHyung-Jun Yim, Yun-Young Hwang, Kyu-Chul Lee. 708-711 [doi]
- "I Can Haz Emoshuns?"-Understanding Anthropomorphosis of Cats among Internet UsersDerek Foster, Ben Kirman, Conor Linehan, Shaun W. Lawson, Daniel Mills, Sarah Ellis, Helen Zulch. 712-715 [doi]
- Exploration in Massively Collaborative Problem SolvingKshanti A. Greene, Dan Thomsen, Pietro Michelucci. 716-719 [doi]
- pieTime: Visualizing Communication PatternsTiffany Ng, Ou Jie Zhao, Dan Cosley. 720-723 [doi]
- Edit Wars in WikipediaRóbert Sumi, Taha Yasseri, András Rung, András Kornai, János Kertész. 724-727 [doi]
- Incremental Relabeling for Active Learning with Noisy Crowdsourced AnnotationsLiyue Zhao, Gita Sukthankar, Rahul Sukthankar. 728-733 [doi]
- Simulating Audiences: Automating Analysis of Values, Attitudes, and SentimentThomas Clay Templeton, Kenneth R. Fleischmann, Jordan L. Boyd-Graber. 734-737 [doi]
- Elderly's Social Presence Supported by ICTs: Investigating User Requirements for Social PresenceChristiane Moser, Verena Fuchsberger, Katja Neureiter, Wolfgang Sellner, Manfred Tscheligi. 738-741 [doi]
- Combining Evidence for Social Situation DetectionGeorg Groh, Christoph Fuchs, Alexander Lehmann. 742-747 [doi]
- Intent-Driven Behavioral Modeling during Cross-Border EpidemicsEunice E. Santos, Eugene Santos Jr., John Korah, Jeremy E. Thompson, Keum Joo Kim, Riya George, Qi Gu, Jacob C. Jurmain, Suresh Subramanian, John Thomas Wilkinson. 748-755 [doi]
- SSDE-Cluster: Fast Overlapping Clustering of Networks Using Sampled Spectral Distance Embedding and GMMsMalik Magdon-Ismail, Jonathan T. Purnell. 756-759 [doi]
- Motivation for Participation in Online Neighborhood Watch Communities: An Empirical Study Involving Invitation LettersNicholas Violi, Ben Shneiderman, Art Hanson, P. J. Rey. 760-765 [doi]
- A Survey of Crowdsourcing SystemsMan-Ching Yuen, Irwin King, Kwong-Sak Leung. 766-773 [doi]
- A Study of Social Interactions in Online Health CommunitiesChristopher C. Yang, Xuning Tang, J. Huang, Jennifer B. Unger. 774-779 [doi]
- Tracking and Predicting Evolution of Social CommunitiesMark K. Goldberg, Malik Magdon-Ismail, Srinivas Nambirajan, James Thompson. 780-783 [doi]
- Masquerading as a Trustworthy Entity through Portable Document File (PDF) FormatGundeep Singh Bindra. 784-789 [doi]
- Beyond FOAF: Challenges in Characterizing Social RelationsJan Hauffa, Gottlieb Bossert, Nadja Richter, Florian Wolf, Nora Liesenfeld, Georg Groh. 790-795 [doi]
- Rational Choice and Barriers to Exponential Complexity in Social Optimization Computations under UncertaintyChjan C. Lim. 796-799 [doi]
- Beyond the Human-Computation MetaphorYiftach Nagar. 800-805 [doi]
- What's Happening: Finding Spontaneous User Clusters Nearby Using TwitterTaehyun Kim, Gonzalo Huerta Cánepa, Jongheon Park, Soon J. Hyun, Dongman Lee. 806-809 [doi]
- The Effect of Post Type, Category and Posting Day on User Interaction Level on FacebookIrena Pletikosa Cvijikj, Erica Dubach Spiegler, Florian Michahelles. 810-813 [doi]
- Generic Model of Activity-Level in Workplace CommunicationTomoaki Akitomi, Koji Ara, Jun-ichiro Watanabe, Kazuo Yano. 814-819 [doi]
- Unsupervised Opinion Phrase Extraction and Rating in Chinese Blog PostsJenq-Haur Wang, Chi-Ching Lee. 820-823 [doi]
- Extracting Social Dimensions Using Fiedler EmbeddingXi Wang, Gita Sukthankar. 824-829 [doi]
- Group Abstraction for Large-Scale Agent-Based Social Diffusion ModelsAlexei Sharpanskykh, Jan Treur. 830-837 [doi]
- Estimating Twitter User Location Using Social Interactions-A Content Based ApproachSwarup Chandra, Latifur Khan, Fahad Bin Muhaya. 838-843 [doi]
- Discovering Collective Mobility PatternsZhenmei Liao, Su Yang, Jianning Liang. 844-847 [doi]
- An Agent-Based Evolutionary Model of LeadershipAlexei Sharpanskykh, Brian R. Spisak. 848-855 [doi]
- Privacy and Information Markets: Controlling Information Flows in Decentralized Social NetworkingGeorg Groh, Stefan Birnkammerer. 856-861 [doi]
- Towards Privacy in a Context-Aware Social Network Based Recommendation SystemPo-Wah Yau, Allan Tomlinson. 862-865 [doi]
- Practice Makes Perfect: Motivating Confident Privacy Protection PracticesLizzie Coles-Kemp, Elahe Kani-Zabihi. 866-871 [doi]
- Secure and Policy-Private Resource Sharing in an Online Social NetworkStefano Braghin, Vincenzo Iovino, Giuseppe Persiano, Alberto Trombetta. 872-875 [doi]
- Inferring Profile Elements from Publicly Available Social Network DataPiotr Kozikowski, Georg Groh. 876-881 [doi]
- Trust Me, I'm an Expert: Trust, Homophily and Expertise in MMOsMuhammad Aurangzeb Ahmad, Iftekhar Ahmed, Jaideep Srivastava, Marshall Scott Poole. 882-887 [doi]
- Finding Community Structure with Performance Guarantees in Scale-Free NetworksThang N. Dinh, My T. Thai. 888-891 [doi]
- An Examination of the Techniques and Implications of the Crowd-Sourced Collection of Forensic DataDaniel Compton, J. A. Hamilton Jr.. 892-895 [doi]
- Contextual Modeling of Personality States' Dynamics in Face-to-Face InteractionsJacopo Staiano, Bruno Lepri, Kyriaki Kalimeri, Nicu Sebe, Fabio Pianesi. 896-899 [doi]
- Litter: A Lightweight Peer-to-Peer Microblogging ServicePierre St. Juste, David Wolinsky, P. Oscar Boykin, Renato J. O. Figueiredo. 900-903 [doi]
- Not All Is Gold That Glitters: Response Time & Satisfaction Rates in Yahoo! AnswersAmit Rechavi, Sheizaf Rafaeli. 904-909 [doi]
- A Feasibility Study on Extracting Twitter Users' Interests Using NLP Tools for Serendipitous ConnectionsScott Songlin Piao, Jon Whittle. 910-915 [doi]
- Practical Privacy-Preserving Multiparty Linear Programming Based on Problem TransformationJannik Dreier, Florian Kerschbaum. 916-924 [doi]
- Achieving Full Security in Privacy-Preserving Data MiningMarina Blanton. 925-934 [doi]
- PrivacyJudge: Effective Privacy Controls for Online Published InformationBastian Könings, David Piendl, Florian Schaub, Michael Weber 0001. 935-941 [doi]
- Intelligent Reactive Access Control for Moving User DataYang Wang, Armen Aghasaryan, Arvind Shrihari, David Pergament, Guy-Bertrand Kamga, Stéphane Betgé-Brezetz. 942-950 [doi]
- Privacy-Preserving Tabu Search for Distributed Graph ColoringYuan Hong, Jaideep Vaidya, Haibing Lu, Basit Shafiq. 951-958 [doi]
- Information Integration and Analysis: A Semantic Approach to PrivacyMadan Oberoi, Pramod Jagtap, Anupam Joshi, Tim Finin, Lalana Kagal. 959-965 [doi]
- An Approach to Community-Oriented Email PrivacyDennis G. Kafura, Denis Gracanin, Manuel A. Pérez-Quiñones, Tom DeHart, Sherley Codio. 966-973 [doi]
- Privacy: Gone with the Typing! Identifying Web Users by Their Typing PatternsPrima Chairunnanda, Nam Pham, Urs Hengartner. 974-980 [doi]
- Privately Detecting Pairwise Correlations in Distributed Time SeriesMehmet Sayal, Lisa Singh. 981-987 [doi]
- Secure Information Sharing on Support of Emergency ManagementBarbara Carminati, Elena Ferrari, Michele Guglielmi. 988-995 [doi]
- Information Sharing across Private Databases: Secure Union RevisitedPawel Jurczyk, Li Xiong. 996-1003 [doi]
- A Probabilistic-Based Trust Evaluation Model Using Hidden Markov Models and Bonus Malus SystemsKevin Xuhua Ouyang, Binod Vaidya, Dimitrios Makrakis. 1004-1011 [doi]
- Accessing Trusted Web Sites from Low-Integrity Systems without End-Host SnoopingBilly Lau, Atul Prakash, Venkatanathan Annamalai. 1012-1019 [doi]
- TGIS: Booting Trust for Secure Information Sharing in Dynamic Group CollaborationsKatharine Chang, Xinwen Zhang, Guoqiang Wang, Kang G. Shin. 1020-1025 [doi]
- Protecting Cryptographic Keys on Client Platforms Using Virtualization and Raw Disk Image AccessSujit Sanjeev, Jatin Lodhia, Raghunathan Srinivasan, Partha Dasgupta. 1026-1032 [doi]
- YAASE: Yet Another Android Security ExtensionGiovanni Russello, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich. 1033-1040 [doi]
- Security Status of VoIP Based on the Observation of Real-World Attacks on a HoneynetMarkus Gruber, Florian Fankhauser, Stefan Taber, Christian Schanes, Thomas Grechenig. 1041-1047 [doi]
- Software Based Remote Attestation for OS Kernel and User ApplicationsRaghunathan Srinivasan, Partha Dasgupta, Tushar Gohad. 1048-1055 [doi]
- CoRPPS: Collusion Resistant Pseudonym Providing SystemBelal Amro, Albert Levi, Yücel Saygin. 1056-1063 [doi]
- Estimating Security Coverage for Cloud ServicesDipankar Dasgupta, Md Moshiur Rahman. 1064-1071 [doi]
- Aintno: Demonstration of Information Accountability on the WebJoe Pato, Sharon Paradesi, Ian Jacobi, Fuming Shih, Sam Wang. 1072-1080 [doi]
- Towards a Game Theoretical Model for Identity Validation in Social Network SitesAnna Cinzia Squicciarini, Christopher Griffin, Smitha Sundareswaran. 1081-1088 [doi]
- Botnet with Browser ExtensionsLei Liu, Xinwen Zhang, Songqing Chen. 1089-1094 [doi]
- An Analysis of Black-Box Web Application Security Scanners against Stored SQL InjectionNidal Khoury, Pavol Zavarsky, Dale Lindskog, Ron Ruhl. 1095-1101 [doi]
- Insider Threat Detection Using Stream Mining and Graph MiningPallabi Parveen, Jonathan Evans, Bhavani M. Thuraisingham, Kevin W. Hamlen, Latifur Khan. 1102-1110 [doi]
- Enforcing Dynamic Interference PolicyFrédéric Prost. 1111-1118 [doi]
- Performance and Scalability Evaluation of Oracle VM Server Software Virtualization in a 64 Bit Linux EnvironmentIbidokun Emmanuel Tope, Pavol Zavarsky, Ron Ruhl, Dale Lindskog. 1119-1124 [doi]
- An Analysis of CVSS v2 Environmental ScoringAyodele Oluwaseun Ibidapo, Pavol Zavarsky, Dale Lindskog, Ron Ruhl. 1125-1130 [doi]
- Auditing Information Leakage for Distance MetricsYikan Chen, David Evans. 1131-1140 [doi]
- Privacy Goals and Settings Mediator Model for PHRsReza Samavi, Mariano P. Consens, Thodoros Topaloglou. 1141-1146 [doi]
- A Decentralized Group Privacy Protocol for Vehicular NetworksHagen Stübing, Marco Pfalzgraf, Sorin A. Huss. 1147-1154 [doi]
- Do the Privacy Policies Reflect the Privacy Controls on Social Networks?Pauline Anthonysamy, Awais Rashid, Phil Greenwood. 1155-1158 [doi]
- Camouflaged Private CommunicationAmir Herzberg, Ely Porat, Nir Soffer, Erez Waisbard. 1159-1162 [doi]
- Using Private Matching for Securely Querying Genomic SequencesJustin Zhan, Luis Cabrera, Gasim Osman, Ronak Shah. 1163-1168 [doi]
- A Privacy-Aware Bayesian Approach for Combining Classifier and Cluster EnsemblesAyan Acharya, Eduardo R. Hruschka, Joydeep Ghosh. 1169-1172 [doi]
- Supportive, Comprehensive and Improved Privacy Protection for Web BrowsingDelfina Malandrino, Vittorio Scarano. 1173-1176 [doi]
- TISS-loc: Towards User Control of Privacy in Location DisclosureDalal Ahmed Al-Arayed, João Pedro Sousa. 1177-1184 [doi]
- Secure and Verifiable Outsourcing of Large-Scale Biometric ComputationsMarina Blanton, Yihua Zhang, Keith B. Frikken. 1185-1191 [doi]
- Conditional Trust Adjustment and InitializationMozhgan Tavakolifard. 1192-1195 [doi]
- Preserving Vote Secrecy in End-to-End Verifiable Voting SystemsWagner Medeiros dos Santos, Ruy J. G. B. de Queiroz. 1196-1201 [doi]
- BM (Break-Merge): An Elegant Approach for Privacy Preserving Data PublishingSandeep Varma Nadimpalli, Valli Kumari Vatsavayi. 1202-1207 [doi]
- An Ontological Study of Data Purpose for Privacy Policy EnforcementShan Chen, Mary-Anne Williams. 1208-1213 [doi]
- Systematic Deployment of Network Security Policy in Centralized and Distributed FirewallsNihel Ben Youssef, Adel Bouhoula. 1214-1219 [doi]
- Risk Mitigation Strategies for Mobile Wi-Fi Robot Toys from Online PedophilesSiew Yong, Dale Lindskog, Ron Ruhl, Pavol Zavarsky. 1220-1223 [doi]
- A Secure and Distributed Framework to Identify and Share Needed InformationWei Jiang, Bharath K. Samanthula. 1224-1230 [doi]
- Dynamic Systems Approach to Analyzing Event Risks and Behavioral Risks with Game TheoryWolfgang Boehmer. 1231-1238 [doi]
- Access Control Model and Design for Delegation Using Authorization TokensHidehito Gomi. 1239-1242 [doi]
- A New Formula of Security Risk Analysis That Takes Risk Improvement Factor into AccountHiroyuki Sato. 1243-1248 [doi]
- Intelligent XML Tag Classification Techniques for XML Encryption ImprovementFaisal T. Ammari, Joan Lu, Maher Abur-rous. 1249-1252 [doi]
- Comparative Analysis of Volatile Memory Forensics: Live Response vs. Memory ImagingAmer Aljaedi, Dale Lindskog, Pavol Zavarsky, Ron Ruhl, Fares Almari. 1253-1258 [doi]
- A New SOA Security Framework Defending Web Services against WSDL AttacksNarges Shahgholi, Mehran Mohsenzadeh, Mir Ali Seyyedi, Saleh Hafez Qorani. 1259-1262 [doi]
- Revisit Dynamic ARIMA Based Anomaly DetectionBonnie Zhu, Shankar Sastry. 1263-1268 [doi]
- A Study of the Effectiveness of CSRF GuardBoyan Chen, Pavol Zavarsky, Ron Ruhl, Dale Lindskog. 1269-1272 [doi]
- E-Government System Security Model (eGSSM): A Multidimensional, Risk Based Approach to E-GovernmentDavid C. Edwards, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Shaun Aghili. 1273-1277 [doi]
- Risk, Uncertainty and Possible WorldsXun Wang, Mary-Anne Williams. 1278-1283 [doi]
- A Novel Trust Computing System for Social NetworksJustin Zhan, Xing Fang. 1284-1289 [doi]
- Trend Analysis of the CVE for Software Vulnerability ManagementYung-Yu Chang, Pavol Zavarsky, Ron Ruhl, Dale Lindskog. 1290-1293 [doi]
- Decoupled Data for Privacy Preserving Record Linkage with Error ManagementHye-Chung Kum, Stanley C. Ahalt. 1294-1301 [doi]
- Encryption for Peer-to-Peer Social NetworksOleksandr Bodriagov, Sonja Buchegger. 1302-1309 [doi]
- Recognizing Your Digital FriendsPatrik Bichsel, Jan Camenisch, Mario Verdicchio. 1310-1313 [doi]
- Dirty Deeds Done Dirt Cheap: A Darker Side to CrowdsourcingChristopher G. Harris 0001. 1314-1317 [doi]
- An Analysis of Anonymity in the Bitcoin SystemFergal Reid, Martin Harrigan. 1318-1326 [doi]
- Analyzing Privacy in Social Networks-An Interdisciplinary ApproachMichael Netter, Sebastian Herbst, Günther Pernul. 1327-1334 [doi]
- Analysis of Mobile P2P Malware Detection Framework through Cabir & Commwarrior FamiliesMuhammad Adeel, Laurissa Tokarchuk. 1335-1343 [doi]
- Modeling and Analyzing User Behavior of Privacy Management on Online Social Network: Research in ProgressKi Jung Lee, Il-Yeol Song. 1344-1351 [doi]
- Sharing and Privacy-Aware RBAC in Online Social NetworksAhmad Kamran Malik, Schahram Dustdar. 1352-1355 [doi]
- Modeling Location-Based Profiles of Social Image Media Using Explorative Pattern MiningFlorian Lemmerich, Martin Atzmueller. 1356-1363 [doi]
- Privacy and Security in Multi-modal User Interface Modeling for Social MediaMohamed Bourimi, Ricardo Tesoriero, Pedro González Villanueva, Fatih Karatas, Philipp Schwarte. 1364-1371 [doi]
- Modeling User Behavior in Adoption and Diffusion of Twitter ClientsElenna R. Dugundji, Ate Poorthuis, Michiel van Meeteren. 1372-1379 [doi]
- Comparing Social Tags to MicroblogsVictoria Lai, Christopher Rajashekar, William Rand. 1380-1383 [doi]
- Current and Future Trends in Social MediaEnkh-Amgalan Baatarjav, Ram Dantu. 1384-1385 [doi]
- Enhancing Exploratory Search with Hedonic Browsing Using Social Tagging ToolsHesham Allam, James Blustein, Louise Spiteri, Michael Bliemel. 1386-1389 [doi]
- Simulation of User Participation and Interaction in Online Discussion GroupsElse Nygren. 1390-1397 [doi]
- Scientific Social Objects: The Social Objects and Multidimensional Network of the myExperiment WebsiteDavid De Roure, Sean Bechhofer, Carole A. Goble, David R. Newman. 1398-1402 [doi]
- Personal Social Screen-A Dynamic Privacy Assignment System for Social Sharing in Complex Social Object NetworksLei Li, Tong Sun, Tao Li. 1403-1408 [doi]
- Rhythms in TwitterDan Chalmers, Simon Fleming, Ian Wakeman, Des Watson. 1409-1414 [doi]
- Social Objects Description and Recommendation in Multidimensional Social Networks: OCSO Ontology and Semantic Spreading ActivationNicolas Marie, Fabien Gandon. 1415-1420 [doi]
- Node-Pair Feature Extraction for Link PredictionTeshome Feyessa, Marwan Bikdash, Gary Lebby. 1421-1424 [doi]
- Urban Mobility: Velocity and Uncertainty in Mobile Phone DataThomas Couronné, Ana-Maria Olteanu Raimond, Zbigniew Smoreda. 1425-1430 [doi]
- Time-Series Monitoring Method of Commercial Accumulations Using Digital Yellow Page DataHiroaki Sengoku, Yuki Akiyama, Ryosuke Shibasaki. 1431-1436 [doi]
- Locast Civic Media: Extending Civic Engagement Boundaries through Mobile Media and Hyper-Local ConversationsDavid Boardman, Federico Casalegno, Steve Pomeroy. 1437-1442 [doi]
- Enhancing Motivation in a Mobile Participatory Sensing Project through GamingKyungsik Han, Eric A. Graham, Dylan Vassallo, Deborah Estrin. 1443-1448 [doi]
- Discovering and Classifying Errors in Way FindingCiaran Owens, Stephen A. Brewster. 1449-1454 [doi]
- Towards Congestion Detection in Transportation Networks Using GPS DataArmando Bazzani, Bruno Giorgini, Riccardo Gallotti, Luca Giovannini, Monica Marchioni, Sandro Rambaldi. 1455-1459 [doi]
- Discriminating Individually Considerate and Authoritarian Leaders by Speech Activity CuesSebastian Feese, Amir Muaremi, Bert Arnrich, Gerhard Tröster, Bertolt Meyer, Klaus Jonas. 1460-1465 [doi]
- Towards a Social Retrieval of Music ContentGiovanna Varni, Gualtiero Volpe, Barbara Mazzarino. 1466-1473 [doi]
- A Framework to Identify Relationships among Students in School Bullying Using Digital Communication MediaMasaru Honjo, Toru Hasegawa, Teruyuki Hasegawa, Koji Mishima, Tatsuya Suda, Toshikazu Yoshida. 1474-1479 [doi]
- The Effect of Relational Context on Personal InfluenceHikaru Yamamoto, Naohiro Matsumura. 1480-1485 [doi]
- Persuasion and Social ContagionMarco Guerini, Carlo Strapparava. 1486-1489 [doi]