Abstract is missing.
- Analyzing the scalability of a social network of agentsMohammad Moshirpour, Shimaa M. El-Sherif, Reda Alhajj, Behrouz H. Far. 1-7 [doi]
- The role of organization hierarchy in technology adoption at the workplaceCharalampos Chelmis, Viktor K. Prasanna. 8-15 [doi]
- Mobile agent-based approach for modeling the epidemics of communicable diseasesM. Saravanan, P. Karthikeyan, A. Arathi, M. Kiruthika, S. Suganya. 16-20 [doi]
- Hierarchical influence maximization for advertising in multi-agent marketsMahsa Maghami, Gita Sukthankar. 21-27 [doi]
- Game-theoretic approach for user migration in DiasporaMohammad Rashedul Hasan, Mohamed Shehab, Ali Noorollahiravari. 28-32 [doi]
- Incremental algorithm for updating betweenness centrality in dynamically growing networksMiray Kas, Matthew Wachs, Kathleen M. Carley, L. Richard Carley. 33-40 [doi]
- Centrality and mode detection in dynamic contact graphs; a joint diagonalisation approachDamien Fay, Jérôme Kunegis, Eiko Yoneki. 41-48 [doi]
- Social ranking techniques for the webTommy H. Nguyen, Boleslaw K. Szymanski. 49-55 [doi]
- Analyzing the social ties and structure of contributors in open source software communityMohammad Y. Allaho, Wang-Chien Lee. 56-60 [doi]
- A threshold method for imbalanced multiple noisy labelingJing Zhang, Xindong Wu, Victor S. Sheng. 61-65 [doi]
- Distributed community detection in web-scale networksMichael Ovelgönne. 66-73 [doi]
- Community detection by popularity based models for authored networked dataTianbao Yang, Prakash Mandayam Comar, Linli Xu. 74-81 [doi]
- Community detection in content-sharing social networksNagarajan Natarajan, Prithviraj Sen, Vineet Chaoji. 82-89 [doi]
- Incremental local community identification in dynamic social networksMansoureh Takaffoli, Reihaneh Rabbany, Osmar R. Zaïane. 90-94 [doi]
- Community mining in signed networks: a multiobjective approachAlessia Amelio, Clara Pizzuti. 95-99 [doi]
- Community-based features for identifying spammers in online social networksSajid Yousuf Bhat, Muhammad Abulaish. 100-107 [doi]
- On detecting association-based clique outliers in heterogeneous information networksManish Gupta, Jing Gao, Xifeng Yan, Hasan Cam, Jiawei Han. 108-115 [doi]
- Battling the internet water army: detection of hidden paid postersCheng Chen, Kui Wu, Venkatesh Srinivasan, Xudong Zhang. 116-120 [doi]
- Guilt by association?: network based propagation approaches for gold farmer detectionMuhammad Aurangzeb Ahmad, Brian Keegan, Atanu Roy, Dmitri Williams, Jaideep Srivastava, Noshir S. Contractor. 121-126 [doi]
- Detect inflated follower numbers in OSN using star samplingHao Wang, Jianguo Lu. 127-133 [doi]
- Frequent conceptual links and link-based clustering: a comparative analysis of two clustering techniquesErick Stattner, Martine Collard. 134-141 [doi]
- Understanding evolving group structures in time-varying networksPaul Caravelli, Yifang Wei, Daniel Subak, Lisa Singh, Janet Mann. 142-148 [doi]
- Assessing group cohesion in homophily networksBenjamin Renoust, Guy Melançon, Marie-Luce Viaud. 149-155 [doi]
- TeamSkill and the NBA: applying lessons from virtual worlds to the real-worldColin DeLong, Loren G. Terveen, Jaideep Srivastava. 156-161 [doi]
- A spatial LDA model for discovering regional communitiesTran Van Canh, Michael Gertz. 162-168 [doi]
- Social moms and health: a multi-platform analysis of mommy communitiesScott H. Burton, Caroline V. Tew, Rosemary Thackeray. 169-174 [doi]
- Modeling information diffusion and community membership using stochastic optimizationAlireza Hajibagheri, Ali Hamzeh, Gita Sukthankar. 175-182 [doi]
- Evolution of coordination in scale-free and small world networks under information diffusion constraintsDharshana Kasthurirathna, Mahendra Piraveenan, Michael Harré. 183-189 [doi]
- Information propagation in microblog networksChenyi Zhang, Jianling Sun, Ke Wang. 190-196 [doi]
- Simulating human mobility and information diffusionMartine Collard, Philippe Collard, Erick Stattner. 197-201 [doi]
- A matter of time - intrinsic or extrinsic - for diffusion in evolving complex networksAlice Albano, Jean-Loup Guillaume, Sébastien Heymann, Bénédicte Le Grand. 202-206 [doi]
- Using explicit linguistic expressions of preference in social media to predict voting behaviorShawn O'Banion, Larry Birnbaum. 207-214 [doi]
- "Who's out there?": identifying and ranking lurkers in social networksAndrea Tagarelli, Roberto Interdonato. 215-222 [doi]
- A probabilistic graphical model for brand reputation assessment in social networksKunpeng Zhang, Doug Downey, Zhengzhang Chen, Yusheng Xie, Yu Cheng, Ankit Agrawal, Wei-keng Liao, Alok N. Choudhary. 223-230 [doi]
- Assessing network vulnerability in a community structure point of viewNam P. Nguyen, Md Abdul Alim, Yilin Shen, My T. Thai. 231-235 [doi]
- The social media genome: modeling individual topic-specific behavior in social mediaPetko Bogdanov, Michael Busch, Jeff Moehlis, Ambuj K. Singh, Boleslaw K. Szymanski. 236-242 [doi]
- A study of user behavior on an online dating sitePeng Xia, Bruno F. Ribeiro, Cindy X. Chen, Benyuan Liu, Don Towsley. 243-247 [doi]
- Estimation of exponential random graph models for large social networks via graph limitsRan He, Tian Zheng. 248-255 [doi]
- Fixed points of graph peelingJames Abello, François Queyroi. 256-263 [doi]
- Towards a faster network-centric subgraph censusPedro Paredes, Pedro Ribeiro. 264-271 [doi]
- The power of consensus: random graphs have no communitiesRomain Campigotto, Jean-Loup Guillaume, Massoud Seifi. 272-276 [doi]
- Multi-objective restructuring in social networksR. Chulaka Gunasekara, Kishan Mehrotra, Chilukuri K. Mohan. 277-281 [doi]
- Politics, sharing and emotion in microblogsTuan-Anh Hoang, William W. Cohen, Ee-Peng Lim, Douglas Pierce, David P. Redlawsk. 282-289 [doi]
- Secular vs. Islamist polarization in Egypt on TwitterIngmar Weber, Venkata Rama Kiran Garimella, Alaa Batayneh. 290-297 [doi]
- Predicting political preference of Twitter usersAibek Makazhanov, Davood Rafiei. 298-305 [doi]
- "w00t! feeling great today!": chatter in Twitter: identification and prevalenceRamnath Balasubramanyan, Aleksander Kolcz. 306-310 [doi]
- Exploiting hashtags for adaptive microblog crawlingXinyue Wang, Laurissa Tokarchuk, Félix Cuadrado, Stefan Poslad. 311-315 [doi]
- Spectral embedding for dynamic social networksDavid B. Skillicorn, Q. Zheng, Carlo Morselli. 316-323 [doi]
- Academic network analysis: a joint topic modeling approachZaihan Yang, Liangjie Hong, Brian D. Davison 0001. 324-333 [doi]
- A statistical framework for streaming graph analysisJames Fairbanks, David Ediger, Robert McColl, David A. Bader, Eric Gilbert. 341-347 [doi]
- STONE: shaping terrorist organizational network efficiencyFrancesca Spezzano, V. S. Subrahmanian, Aaron Mannes. 348-355 [doi]
- How do people link?: analysis of contact structures in human face-to-face proximity networksChristoph Scholz, Martin Atzmueller, Mark Kibanov, Gerd Stumme. 356-363 [doi]
- sonLP: social network link prediction by principal component regressionZhifeng Bao, Yong Zeng, Y. C. Tay. 364-371 [doi]
- Acquaintance or partner?: predicting partnership in online and location-based social networksMichael Steurer, Christoph Trattner. 372-379 [doi]
- Link prediction in human mobility networksYang Yang, Nitesh V. Chawla, Prithwish Basu, Bhaskar Prabhala, Thomas F. La Porta. 380-387 [doi]
- The influence of feedback with different opinions on continued user participation in online newsgroupsTeng Wang, Keith C. Wang, Fredrik Erlandsson, Shyhtsun Felix Wu, Robert Faris. 388-395 [doi]
- I act, therefore I judge: network sentiment dynamics based on user activity changeKathy Macropol, Petko Bogdanov, Ambuj K. Singh, Linda Petzold, Xifeng Yan. 396-402 [doi]
- Using the length of the speech to measure the opinionLuigi Lancieri, Eric Leprêtre. 403-407 [doi]
- Graph-based informative-sentence selection for opinion summarizationLinhong Zhu, Sheng Gao, Sinno Jialin Pan, Haizhou Li, Dingxiong Deng, Cyrus Shahabi. 408-412 [doi]
- Co-training over domain-independent and domain-dependent features for sentiment analysis of an online cancer support communityPrakhar Biyani, Cornelia Caragea, Prasenjit Mitra, Chong Zhou, John Yen, Greta E. Greer, Kenneth Portier. 413-417 [doi]
- Deconstructing centrality: thinking locally and ranking globally in networksSibel Adali, Xiaohui Lu, Malik Magdon-Ismail. 418-425 [doi]
- Computer science fields as ground-truth communities: their impact, rise and fallTanmoy Chakraborty, Sandipan Sikdar, Vihar Tammana, Niloy Ganguly, Animesh Mukherjee. 426-433 [doi]
- "You know because I know": a multidimensional network approach to human resources problemMichele Coscia, Giulio Rossetti, Diego Pennacchioli, Damiano Ceccarelli, Fosca Giannotti. 434-441 [doi]
- ASCOS: an asymmetric network structure COntext similarity measureHung-Hsuan Chen, C. Lee Giles. 442-449 [doi]
- Event identification for social streams using keyword-based evolving graph sequencesElizabeth Kwan, Pei-Ling Hsu, Jheng-He Liang, Yi-Shin Chen. 450-457 [doi]
- The best answers? think twice: online detection of commercial campaigns in the CQA forumsCheng Chen, Kui Wu, Venkatesh Srinivasan, R. Kesav Bharadwaj. 458-465 [doi]
- Graph-based Sybil detection in social and information systemsYazan Boshmaf, Konstantin Beznosov, Matei Ripeanu. 466-473 [doi]
- Learning from the crowd: an evolutionary mutual reinforcement model for analyzing eventsDebanjan Mahata, Nitin Agarwal. 474-478 [doi]
- Preserving privacy and frequent sharing patterns for social network data publishingBenjamin C. M. Fung, Yan'an Jin, Jiaming Li. 479-485 [doi]
- Temporal influence over the Last.fm social networkRóbert Pálovics, András A. Benczúr. 486-493 [doi]
- Routing questions for collaborative answering in community question answeringShuo Chang, Aditya Pal. 494-501 [doi]
- Narrowcasting in social media: effects and perceptionsJorge Gonçalves, Vassilis Kostakos, Jayant Venkatanathan. 502-509 [doi]
- Towards explanation of scientific and technological emergenceJames Michaelis, Deborah L. McGuinness, Cynthia Chang, Daniel Hunter, Olga Babko-Malaya. 510-516 [doi]
- Near real time assessment of social media using geo-temporal network analyticsKathleen M. Carley, Jürgen Pfeffer, Huan Liu, Fred Morstatter, Rebecca Goolsby. 517-524 [doi]
- Simmelian backbones: amplifying hidden homophily in Facebook networksBobo Nick, Conrad Lee, Pádraig Cunningham, Ulrik Brandes. 525-532 [doi]
- Detecting stochastic temporal network motifs for human communication patterns analysisKai Liu, William K. Cheung, Jiming Liu. 533-540 [doi]
- Usable object management approaches for online social networksGorrell P. Cheek, Mohamed Shehab. 541-547 [doi]
- Clustering memes in social mediaEmilio Ferrara, Mohsen JafariAsbagh, Onur Varol, Vahed Qazvinian, Filippo Menczer, Alessandro Flammini. 548-555 [doi]
- A framework for detecting public health trends with TwitterJon Parker, Yifang Wei, Andrew Yates, Ophir Frieder, Nazli Goharian. 556-563 [doi]
- Network denoising in social mediaHuiji Gao, Xufei Wang, Jiliang Tang, Huan Liu. 564-571 [doi]
- Detecting changes in content and posting time distributions in social mediaKazumi Saito, Kouzou Ohara, Masahiro Kimura, Hiroshi Motoda. 572-578 [doi]
- An exploration of discussion threads in social news sites: a case study of the Reddit communityTim Weninger, Xihao Avi Zhu, Jiawei Han. 579-583 [doi]
- Exploring friend's influence in cultures in TwitterAnika Gupta, Katia P. Sycara, Geoffrey J. Gordon, Ahmed Hefny. 584-591 [doi]
- Finding influencers in networks using social capitalKarthik Subbian, Dhruv Sharma, Zhen Wen, Jaideep Srivastava. 592-599 [doi]
- An agent-based approach to modeling online social influencePeter-Paul van Maanen, Bob van der Vecht. 600-607 [doi]
- Identifying influential scholars in academic social media platformsNa Li, Denis Gillet. 608-614 [doi]
- Novel user influence measurement based on user interaction in microblogXiang Li, Shaoyin Cheng, Wenlong Chen, Fan Jiang. 615-619 [doi]
- Choosing which message to publish on social networks: a contextual bandit approachRicardo Lage, Ludovic Denoyer, Patrick Gallinari, Peter Dolog. 620-627 [doi]
- AdaM: adaptive-maximum imputation for neighborhood-based collaborative filteringYongli Ren, Gang Li, Jun Zhang, Wanlei Zhou. 628-635 [doi]
- Towards a personalized, scalable, and exploratory academic recommendation serviceOnur Küçüktunç, Erik Saule, Kamer Kaya, Ümit V. Çatalyürek. 636-641 [doi]
- A HITS-based POI recommendation algorithm for location-based social networksXuelian Long, James Joshi. 642-647 [doi]
- A biased random walk recommender based on rejection samplingGeorgios Alexandridis, Georgios Siolas, Andreas Stafylopatis. 648-652 [doi]
- Socialization and trust formation: a mutual reinforcement? An exploratory analysis in an online virtual settingAtanu Roy, Zoheb Hassan Borbora, Jaideep Srivastava. 653-660 [doi]
- Dynamics of trust reciprocation in multi-relational networksAyush Singhal, Karthik Subbian, Jaideep Srivastava, Tamara G. Kolda, Ali Pinar. 661-665 [doi]
- A model for recursive propagations of reputations in social networksJooyoung Lee, Jae C. Oh. 666-670 [doi]
- k-degree anonymity on large networksJordi Casas-Roma, Jordi Herrera-Joancomartí, Vicenç Torra. 671-675 [doi]
- Which links should I use?: a variogram-based selection of relationship measures for prediction of node attributes in temporal multigraphsAlexey Uversky, Dusan Ramljak, Vladan Radosavljevic, Kosta Ristovski, Zoran Obradovic. 676-683 [doi]
- Steeler nation, 12th man, and boo birds: classifying Twitter user interests using time seriesTao Yang, Dongwon Lee, Su Yan. 684-691 [doi]
- On the utility of abstraction in labeling actors in social networksNgot Bui, Vasant Honavar. 692-698 [doi]
- Analysis of publicly disclosed information in Facebook profilesReza Farahbakhsh, Xiao Han, Ángel Cuevas, Noël Crespi. 699-705 [doi]
- Recovering information recipients in social media via provenanceZhuo Feng, Pritam Gundecha, Huan Liu. 706-711 [doi]
- Influence of controlled and uncontrolled interventions on Twitter in different target groupsPeter-Paul van Maanen, Olav Aarts, Erik Boertjes, Remco Wijn. 712-719 [doi]
- TopicFlow: visualizing topic alignment of Twitter data over timeSana Malik, Alison Smith, Timothy Hawes, Panagis Papadatos, Jianyu Li, Cody Dunne, Ben Shneiderman. 720-726 [doi]
- Evolution of communities on Twitter and the role of their leaders during emergenciesYulia Tyshchuk, Hao Li, Heng Ji, William A. Wallace. 727-733 [doi]
- Semantically meaningful group detection within sub-communities of Twitter blogosphere: a topic oriented multi-objective clustering approachDionisios N. Sotiropoulos, Chris D. Kounavis, George M. Giaglis. 734-738 [doi]
- Language independent gender classification on TwitterJalal S. Alowibdi, Ugo A. Buy, Philip Yu. 739-743 [doi]
- Solving the missing node problem using structure and attribute informationSigal Sina, Avi Rosenfeld, Sarit Kraus. 744-751 [doi]
- Differential privacy for neighborhood-based collaborative filteringTianqing Zhu, Gang Li, Yongli Ren, Wanlei Zhou, Ping Xiong. 752-759 [doi]
- Enhancing tag-based collaborative filtering via integrated social networking informationSogol Naseri, Arash Bahrehmand, Chen (Cherie) Ding, Chi-Hung Chi. 760-764 [doi]
- An interactive visualization interface for studying egocentric, categorical, contact diary datasetsChris Bryan, Kwan-Liu Ma, Yang-chih Fu. 771-778 [doi]
- Visual exploration of academic career pathsMeng Qi Yelena Wu, Robert Faris, Kwan-Liu Ma. 779-786 [doi]
- Visualization and modeling of structural features of a large organizational email networkBenjamin H. Sims, Nikolai Sinitsyn, Stephan Eidenbenz. 787-791 [doi]
- Circles, posts and privacy in egocentric social networks: an exploratory visualization approachBo Gao, Bettina Berendt. 792-796 [doi]
- Inside insider trading: patterns & discoveries from a large scale exploratory analysisAcar Tamersoy, Bo Xie, Stephen L. Lenkey, Bryan R. Routledge, Duen Horng Chau, Shamkant B. Navathe. 797-804 [doi]
- Mining company networks for marketing insights and sales leadsKareem S. Aggour, Bethany Hoogs, Christina Leber, Carry Correia, Deniz Senturk-Doganaksoy. 805-812 [doi]
- Using social network knowledge for detecting spider constructions in social security fraudVéronique Van Vlasselaer, Jan Meskens, Dries Van Dromme, Bart Baesens. 813-820 [doi]
- Toward the next generation of recruitment tools: an online social network-based job recommender systemMamadou Diaby, Emmanuel Viennet, Tristan Launay. 821-828 [doi]
- Chelsea won, and you bought a t-shirt: characterizing the interplay between Twitter and e-commerceHaipeng Zhang, Nish Parikh, Gyanit Singh, Neel Sundaresan. 829-836 [doi]
- Ant colony based approach to predict stock market movement from mood collected on TwitterSalah Bouktif, Mamoun Adel Awad. 837-845 [doi]
- Identifying dynamics and collective behaviors in microblogging tracesHuan-Kai Peng, Radu Marculescu. 846-853 [doi]
- A Twitter-based smoking cessation recruitment systemAhmed Abdeen Hamed, Xindong Wu, James R. Fingar. 854-861 [doi]
- A social-aware multimedia system for interactive cultural and educational experiencesKleopatra Konstanteli, Athanasios Voulodimos, Konstantinos Psychas, Dimitri Nicolopoulos, Anthousis Andreadis, Simon Crowle, David Osbourne, Angelos Yannopoulos, Manolis Wallace, Theodora A. Varvarigou. 862-869 [doi]
- Predicting time-sensitive user locations from social mediaAnuj Jaiswal, Wei Peng, Tong Sun. 870-877 [doi]
- Spatio-temporal mining of software adoption & penetrationEvangelos E. Papalexakis, Tudor Dumitras, Duen Horng (Polo) Chau, B. Aditya Prakash, Christos Faloutsos. 878-885 [doi]
- Analysis of the reputation system and user contributions on a question answering website: StackOverflowDana Movshovitz-Attias, Yair Movshovitz-Attias, Peter Steenkiste, Christos Faloutsos. 886-893 [doi]
- ChurnVis: visualizing mobile telecommunications churn on a social network with attributesDaniel Archambault, Neil J. Hurley, Cuong To Tu. 894-901 [doi]
- Measurement and understanding of cyberlocker URL-sharing sites: focus on movie filesMengjuan Liu, Zhuo Zhang, Pan Hui, Yujie Qin, Sanjeev R. Kulkarni. 902-909 [doi]
- Measuring performance & interrelatedness in social networks of knowledge workersSayed Rebehy, Kon Shing Kenneth Chung. 910-915 [doi]
- Development and validation of an HIV risk scorecard modelWilbert Sibanda, Philip Pretorius. 916-922 [doi]
- A high performance algorithm for clustering of large-scale protein mass spectrometry data using multi-core architecturesFahad Saeed, Jason D. Hoffert, Mark A. Knepper. 923-930 [doi]
- Envisioning complexity in healthcare systems through social networksAndrew Vakarau Levula, Kon Shing Kenneth Chung, Jane Young, Kate White. 931-936 [doi]
- The forecast for electronic health record access: partly cloudyBrian Coats, Subrata Acharya. 937-942 [doi]
- Biomedical text disambiguation using UMLSWessam Gad El Rab, Osmar R. Zaïane, Mohammad El-Hajj. 943-947 [doi]
- Combining information extraction and text mining for cancer biomarker detectionKhaled Dawoud, Shang Gao, Ala Qabaja, Panagiotis Karampelas, Reda Alhajj. 948-955 [doi]
- Mining nursing care plan from data extracted from hospital information systemShusaku Tsumoto, Shoji Hirano, Haruko Iwata. 956-961 [doi]
- MedCase: a template medical case store for case-based reasoning in medical decision supportHsien-Tseng Wang, Abdullah Uz Tansel. 962-967 [doi]
- Lab-on-a-chip turns soft: computer-aided, software-enabled microfluidics designAung K. Soe, Michael Fielding, Saeid Nahavandi. 968-971 [doi]
- Disease evolution visualization through historized versions of medical imagesJalel Akaichi, Rawia Ben Attouch. 972-975 [doi]
- Optometry training simulation with augmented reality and hapticsLei Wei 0002, Saeid Nahavandi, Harrison Weisinger. 976-977 [doi]
- Simulation of mobile treatment monitoring systemEmre Ermisoglu, Coskun Bayrak, Engin Mendi. 978-981 [doi]
- Efficient mobile services consumption in mHealthRichard K. Lomotey, Ralph Deters. 982-989 [doi]
- A dissemination-based mobile web application framework for juvenile ideopathic arthritis patientsRahnuma Kazi, Ralph Deters. 990-997 [doi]
- Towards a networks-enabled complexity profile for examining responsibility for decision-making by healthcare professionalsKon Shing Kenneth Chung, Jane Young, Kate White. 998-1003 [doi]
- Detecting multiple aliases in social mediaFredrik Johansson, Lisa Kaati, Amendra Shrestha. 1004-1011 [doi]
- Game theoretic attack analysis in online social network (OSN) servicesJonathan White, Joon S. Park, Charles A. Kamhoua, Kevin A. Kwiat. 1012-1019 [doi]
- LookingGlass: a visual intelligence platform for tracking online social movementsNyunsu Kim, Sedat Gokalp, Hasan Davulcu, Mark Woodward. 1020-1027 [doi]
- Improving the language of influenceDavid B. Skillicorn, Christian Leuprecht. 1028-1033 [doi]
- Shallow parsing for recognizing threats in Dutch tweetsNelleke Oostdijk, Hans van Halteren. 1034-1041 [doi]
- Social network intelligence analysis to combat street gang violenceDamon Paulo, Bradley Fischl, Tanya Markow, Michael Martin, Paulo Shakarian. 1042-1049 [doi]
- Online activity traces around a "Boston bomber"Alexander Semenov, Alexander Nikolaev, Jari Veijalainen. 1050-1053 [doi]
- Surveillance of sentiment and affect in open source text: a unified model of affect analysis and topic modelingJennifer Carlson, Peter David, Timothy Hawes. 1054-1057 [doi]
- Which crime features are important for criminal network members?Fatih Ozgul, Zeki Erdem. 1058-1060 [doi]
- Data intensive review mining for sentiment classification across heterogeneous domainsFederica Bisio, Paolo Gastaldo, Chiara Peretti, Rodolfo Zunino, Erik Cambria. 1061-1067 [doi]
- eWar - reality of future warsGorazd Praprotnik, Teodora Ivanusa, Iztok Podbregar. 1068-1072 [doi]
- An analyst-adaptive approach to focused crawlersRodolfo Zunino, Federica Bisio, Chiara Peretti, Roberto Surlinelli, Eugenio Scillia, Augusto Ottaviano, Fabio Sangiacomo. 1073-1077 [doi]
- Enhancing text clustering model based on truncated singular value decomposition, fuzzy art and cross validationChoukri Djellali. 1078-1083 [doi]
- PREVE: a policy recommendation engine based on vector equilibria applied to reducing LeT's attacksJohn P. Dickerson, Anshul Sawant, Mohammad Taghi Hajiaghayi, V. S. Subrahmanian. 1084-1091 [doi]
- Mobile electronic triaging for emergency response improvement through crowdsourced and sensor-detected informationLiliya I. Besaleva, Alfred C. Weaver. 1092-1093 [doi]
- Envisioning complexity in healthcare systems using discrete event simulation and social network analysisKon Shing Kenneth Chung, Alexander Komashie, Neil Yorke-Smith. 1094-1095 [doi]
- What do large networks look like?Hao Wang, Jianguo Lu. 1096-1099 [doi]
- #Egypt: visualizing Islamist vs. secular tension on TwitterIngmar Weber, Kiran Garimella. 1100-1101 [doi]
- Structural and collaborative properties of team science networksMinh X. Hoang, Ram Ramanathan, Terrence J. Moore, Ananthram Swami. 1102-1109 [doi]
- Identifying unreliable sources of skill and competency informationMaryam Fazel-Zarandi, Mark S. Fox. 1110-1115 [doi]
- Community detection in social networks through similarity virtual networksKanna AlFalahi, Yacine Atif, Saad Harous. 1116-1123 [doi]
- OverCite: finding overlapping communities in citation networkTanmoy Chakraborty, Abhijnan Chakraborty. 1124-1131 [doi]
- Researcher-guide networking: a case of renewable energy researchVipan Kumar, Rohit Sagar, Sapna A. Narula. 1132-1138 [doi]
- OLAPing social media: the case of TwitterNafees Ur Rehman, Andreas Weiler, Marc H. Scholl. 1139-1146 [doi]
- Monitoring and analyzing customer feedback through social media platforms for identifying and remedying customer problemsSumit Bhatia, Jingxuan Li, Wei Peng, Tong Sun. 1147-1154 [doi]
- Opinion mining and semantic analysis of touristic social networksChristophe Thovex, Francky Trichet. 1155-1160 [doi]
- GASNA: greedy algorithm for social network anonymizationMayank Singh Shishodia, Sumeet Jain, B. K. Tripathy. 1161-1166 [doi]
- Exploiting online social data in ontology learning for event tracking and emergency responseChung-Hong Lee, Chih-Hong Wu, Hsin-Chang Yang, Wei-Shiang Wen, Chang-Yi Chiang. 1167-1174 [doi]
- Familiar strangers detection in online social networksCharles Perez, Babiga Birregah, Marc Lemercier. 1175-1182 [doi]
- Efficient mining of frequent itemsets in social network data based on MapReduce frameworkZahra Farzanyar, Nick Cercone. 1183-1188 [doi]
- Propagating online social networks: via different kinds of weak tiesTerry Hui-Ye Chiu, Shy Min Chen. 1189-1195 [doi]
- Content matters: a study of hate groups detection based on social networks analysis and web miningI-Hsien Ting, Shyue-Liang Wang, Hsing-Miao Chi, Jyun-Sing Wu. 1196-1201 [doi]
- Standard deviations of degree differences as indicators of mixing patterns in complex networksGnana Thedchanamoorthy, Mahendra Piraveenan, Dharshana Kasthurirathna. 1202-1208 [doi]
- Prediction of movies box office performance using social mediaKrushikanth R. Apala, Merin Jose, Supreme Motnam, Chien-Chung Chan, Kathy J. Liszka, Federico de Gregorio. 1209-1214 [doi]
- Discovering hot topics using Twitter streaming data: social topic detection and geographic clusteringHwi-Gang Kim, Seongjoo Lee, Sunghyon Kyeong. 1215-1220 [doi]
- Evolution of friendship network and daily activities of high school studentsHsieh-Hua Yang, Chyi-In Wu. 1221-1228 [doi]
- On the use of mobility data for discovery and description of social tiesMitra Baratchi, Nirvana Meratnia, Paul J. M. Havinga. 1229-1236 [doi]
- Howcare: a personal health cloud archive and care-partners' communityLiang-Cheng Huang, Wei-chung Liu, Seng-cho Timothy Chou. 1237-1241 [doi]
- Compensatory seeding in networks with varying avaliability of nodesJaroslaw Jankowski, Radoslaw Michalski, Przemyslaw Kazienko. 1242-1249 [doi]
- Incremental closeness centrality for dynamically changing social networksMiray Kas, Kathleen M. Carley, L. Richard Carley. 1250-1258 [doi]
- Analyzing the impact of social media on social movements: a computational study on Twitter and the occupy wall street movementLi Tan, Suma Ponnam, Patrick Gillham, Bob Edwards, Erik Johnson. 1259-1266 [doi]
- Trust based recommendation systemsMakbule Gulcin Ozsoy, Faruk Polat. 1267-1274 [doi]
- 3d visualization of the simulation research results of new method for cooperative of a group of mobile agents for swarm behavior simulationEva Pajorova, Ladislav Hluchý, Marek Masár. 1275-1279 [doi]
- Visualizing the network of software agents for verification of multiagent systemsFatemeh Hendijani Fard, Behrouz H. Far. 1280-1281 [doi]
- Reciprocity in innovation contest communities: reciprocity vs. free-riding in an environment of competitionWolfgang Kathan, Johann Füller, Katja Hutter. 1282-1290 [doi]
- Different approaches to community evolution prediction in blogosphereBogdan Gliwa, Piotr Bródka, Anna Zygmunt, Stanislaw Saganowski, Przemyslaw Kazienko, Jaroslaw Kozlak. 1291-1298 [doi]
- Active learning and inference method for within network classificationTomasz Kajdanowicz, Radoslaw Michalski, Katarzyna Musial, Przemyslaw Kazienko. 1299-1306 [doi]
- REPLOT: REtrieving profile links on Twitter for suspicious networks detectionCharles Perez, Babiga Birregah, Robert Layton, Marc Lemercier, Paul Andrew Watters. 1307-1314 [doi]
- Enriching employee ontology for enterprises with knowledge discovery from social networksHao Wu, Charalampos Chelmis, Vikram Sorathia, Yinuo Zhang, Om Prasad Patri, Viktor K. Prasanna. 1315-1322 [doi]
- Human sensing for smart citiesDerek Doran, Swapna S. Gokhale, Aldo Dagnino. 1323-1330 [doi]
- Human mobility and predictability enriched by social phenomena informationNicolas B. Ponieman, Alejo Salles, Carlos Sarraute. 1331-1336 [doi]
- Non-intrusive detection of psycho-social dimensions using sociolinguisticsPeggy Wu, Jeffrey M. Rye, Christopher A. Miller, Sonja Schmer-Galunder, Tammy Ott. 1337-1344 [doi]
- Recommender system by grasping individual preference and influence from other usersTae Sato, Masanori Fujita, Minoru Kobayashi, Koji Ito. 1345-1351 [doi]
- Competition over timeline in social networksEitan Altman, Parmod Kumar, Srinivasan Venkatramanan, Anurag Kumar 0001. 1352-1357 [doi]
- Homing socialbots: intrusion on a specific organization's employee using SocialbotsAviad Elyashar, Michael Fire, Dima Kagan, Yuval Elovici. 1358-1365 [doi]
- What kind of network are you?: using local and global characteristics in network categorisation tasksKatarzyna Musial, Bogdan Gabrys, Marcin Buczko. 1366-1373 [doi]
- A comparison of web robot and human requestsDerek Doran, Kevin Morillo, Swapna S. Gokhale. 1374-1380 [doi]
- Fuzzy classification in web usage mining using fuzzy quantifiersMaybin K. Muyeba, Liangxiu Han. 1381-1386 [doi]
- An empirical analysis of a network of expertiseTruc Viet Le, Minh Thap Nguyen. 1387-1394 [doi]
- A network science approach to modelling and predicting empathyJayant Venkatanathan, Evangelos Karapanos, Vassilis Kostakos, Jorge Gonçalves. 1395-1400 [doi]
- Sentiment analysis of Hollywood movies on TwitterUmesh Hodeghatta Rao. 1401-1404 [doi]
- A study on Twitter user-follower network: a network based analysisMartha VenkataSwamy, Weizhong Zhao, Xiaowei Xu. 1405-1409 [doi]
- A probability based subnet selection method for hot event detection in Sina Weibo microbloggingPei Shen, Yi Zhou, Kai Chen 0006. 1410-1413 [doi]
- Personality, movie preferences, and recommendationsJennifer Golbeck, Eric Norris. 1414-1415 [doi]
- Indifferent attachment: the role of degree in ranking friendsDavid Liben-Nowell, Carissa Knipe, Calder Coalson. 1416-1417 [doi]
- Determining credibility from social network structureErica Briscoe, D. Scott Appling, Rudolph L. Mappus IV, Heather Hayes. 1418-1424 [doi]
- Two types of Twitter users with equally many followersKodai Saito, Naoki Masuda. 1425-1426 [doi]
- On predicting Twitter trend: factors and modelsPeng Zhang, Xufei Wang, Baoxin Li. 1427-1429 [doi]
- Real-time emotion classification of TweetsOlivier Janssens, Maarten Slembrouck, Steven Verstockt, Sofie Van Hoecke, Rik Van de Walle. 1430-1431 [doi]
- A distributed algorithm for community detection in large graphsHarris Papadakis, Costas Panagiotakis, Paraskevi Fragopoulou. 1432-1434 [doi]
- Maximizing influence of viral marketing via evolutionary user selectionSanket Anil Naik, Qi Yu. 1435-1436 [doi]
- Topic model-based link community detection with adjustable range of overlappingLe Yu, Bin Wu, Bai Wang. 1437-1438 [doi]
- Network similarity via multiple social theoriesMichele Berlingerio, Danai Koutra, Tina Eliassi-Rad, Christos Faloutsos. 1439-1440 [doi]
- Location-specific tweet detection and topic summarization in TwitterVineeth Rakesh, Chandan K. Reddy, Dilpreet Singh, Ramachandran MS. 1441-1444 [doi]
- Link prediction in multi-relational collaboration networksXi Wang, Gita Sukthankar. 1445-1447 [doi]
- What is he/she like?: estimating Twitter user attributes from contents and social neighborsJun Ito, Takahide Hoshide, Hiroyuki Toda, Tadasu Uchiyama, Kyosuke Nishida. 1448-1450 [doi]
- Temporal subgraph isomorphismUrsula Redmond, Pádraig Cunningham. 1451-1452 [doi]
- Integrating heterogeneous information within a social network for detecting communitiesJuan David Cruz, Cécile Bothorel, François Poulet. 1453-1454 [doi]
- TUCAN: Twitter user centric ANalyzerLuigi Grimaudo, Han Song, Mario Baldi, Marco Mellia, Maurizio M. Munafò. 1455-1457 [doi]
- Toward characterizing a more significant identity of core structure within dynamic social networkBillel Hamadache, Hassina Seridi-Bouchelaghem, Nadir Farah. 1458-1459 [doi]
- Emoticon recommendation system for effective communicationYuki Urabe, Rafal Rzepka, Kenji Araki. 1460-1461 [doi]
- DelayFlow centrality for identifying critical nodes in transportation networksYew-Yih Cheng, Roy Ka-Wei Lee, Ee-Peng Lim, Feida Zhu. 1462-1463 [doi]
- A workbench to construct and re-use network analysis workflows: concept, implementation, and example caseTilman Göhnert, Andreas Harrer, Tobias Hecking, Heinz Ulrich Hoppe. 1464-1466 [doi]
- Identifying user attributes through non-i.i.d. multi-instance learningHyun-Je Song, Jeong Woo Son, Seong-Bae Park. 1467-1468 [doi]
- Cancelable fusion using social network analysisPadma Polash Paul, Marina L. Gavrilova. 1469-1471 [doi]
- A new rumor propagation model and control strategy on social networksYuanyuan Bao, Chengqi Yi, Yibo Xue, Yingfei Dong. 1472-1473 [doi]
- Structure and attributes community detection benchmark and a novel selection methodHaithum Elhadi, Gady Agam. 1474-1476 [doi]
- Visualizing the impact of time series data for predicting user interactionsBjoern Elmar Macek, Martin Atzmueller. 1477-1478 [doi]
- Networks and network analysis for defence and securityAnthony Masys. 1479-1480 [doi]
- On the value of weak ties for modeling interventions in online health communitiesAlexander G. Nikolaev, Scott McIntosh. 1481-1482 [doi]
- OpenEHR-based pervasive health information system for primary care: first brazilian experience for public careHilton Vicente César. 1483 [doi]
- A system for the automated author attribution of text and instant messagesJonathan A. Donais, Richard A. Frost, Shane M. Peelar, Robert A. Roddy. 1484-1485 [doi]
- Content feature enrichment for analyzing trust relationships in web forumsJohn Piorkowski, Lina Zhou. 1486-1487 [doi]
- Mining tourist routes using Flickr tracesGaël Chareyron, Jérôme Da Rugna, Bérengère Branchet. 1488-1489 [doi]
- Role discovery based on sociology attributes clustering in Sina MicroblogXinglong Yu, Bin Wu. 1490-1491 [doi]
- Towards a unified agent-based approach for real time computer forensic evidence collectionShadi Al Awawdeh, Ibrahim M. Baggili, Andrew Marrington, Farkhund Iqbal. 1492-1493 [doi]
- Using lexicometry and vocabulary analysis techniques to detect a signature for web profileSara El Manar El Bouanani, Ismail Kassou. 1494-1498 [doi]