Abstract is missing.
- A local seed selection algorithm for overlapping community detectionFarnaz Moradi, Tomas Olovsson, Philippas Tsigas. 1-8 [doi]
- Community evolution prediction in dynamic social networksMansoureh Takaffoli, Reihaneh Rabbany, Osmar R. Zaïane. 9-16 [doi]
- Overlapping Stochastic Community FindingAaron F. McDaid, Neil J. Hurley, Thomas Brendan Murphy. 17-20 [doi]
- rLinkTopic: A probabilistic model for discovering regional LinkTopic communitiesTran Van Canh, Michael Gertz. 21-26 [doi]
- A uniform framework for community detection via influence maximization in social networksFei Jiang, Shuyuan Jin, Yanlei Wu, Jin Xu. 27-32 [doi]
- Gossip-based partitioning and replication for Online Social NetworksMuhammad Anis Uddin Nasir, Fatemeh Rahimian, Sarunas Girdzijauskas. 33-42 [doi]
- Online evaluation re-scoring based on review behavior analysisRong Zhang, Xiaofeng He, Aoying Zhou, Chaofeng Sha. 43-50 [doi]
- Understanding lurking behaviors in social networks across timeAndrea Tagarelli, Roberto Interdonato. 51-55 [doi]
- Start-up firms' networks for innovation: Embedded in entrepreneurs' networks in private and public spheresKent Wickstrom Jensen, Thomas Schott. 56-61 [doi]
- A new space for comparing graphsAnshumali Shrivastava, Ping Li 0001. 62-71 [doi]
- A model of consistent node types in signed directed social networksDongjin Song, David A. Meyer. 72-80 [doi]
- Name disambiguation from link data in a collaboration graphBaichuan Zhang, Tanay Kumar Saha, Mohammad Al Hasan. 81-84 [doi]
- A backbone extraction method with Local Search for complex weighted networksZhan Bu, Zhiang Wu, Liqiang Qian, Jie Cao, Guandong Xu. 85-88 [doi]
- Efficient algorithm for ranking of nodes' importance in information disseminationZhuo Qi Lee, Wen-Jing Hsu, Miao Lin. 89-92 [doi]
- A unified generative Bayesian model for community discovery and role assignment based upon latent interaction factorsGianni Costa, Riccardo Ortale. 93-100 [doi]
- Community detection in dynamic social networks: A game-theoretic approachHamidreza Alvari, Alireza Hajibagheri, Gita Reese Sukthankar. 101-107 [doi]
- Using triads to identify local community structure in social networksJustin Fagnan, Osmar R. Zaïane, Denilson Barbosa. 108-112 [doi]
- An modularity-based overlapping community structure detecting algorithmKui Meng, Gongshen Liu, Qiong Hu, Jianhua Li. 113-117 [doi]
- Overlapping community detection in large networks from a data fusion viewLe Yu, Bin Wu, Shuai Zhao, Bai Wang. 118-121 [doi]
- The network you keep: Analyzing persons of interest using cliqsterSaber Shokat Fadaee, Mehrdad Farajtabar, Ravi Sundaram, Javed A. Aslam, Nikos I. Passas. 122-129 [doi]
- Automatic classification of scientific groups as productive: An approach based on motif analysisTanmoy Chakraborty 0002, Niloy Ganguly, Animesh Mukherjee. 130-137 [doi]
- Behavioral detection of spam URL sharing: Posting patterns versus click patternsCheng Cao, James Caverlee. 138-141 [doi]
- Interactions around social networks matter: Predicting the social network from associated interaction networksMohammed Abufouda, Katharina Anna Zweig. 142-145 [doi]
- Constructing social networks from semi-structured chat-log dataSude Tavassoli, Markus Moessner, Katharina Anna Zweig. 146-149 [doi]
- Detecting malicious clients in ISP networks using HTTP connectivity graph and flow informationLei Liu, Sabyasachi Saha, Ruben Torres, Jianpeng Xu, Pang-Ning Tan, Antonio Nucci, Marco Mellia. 150-157 [doi]
- Triggering patterns of topology changes in dynamic graphsMehdi Kaytoue, Yoann Pitarch, Marc Plantevit, Céline Robardet. 158-165 [doi]
- Indexing bipartite memberships in web graphsYusheng Xie, Zhengzhang Chen, Diana Palsetia, Ankit Agrawal, Alok N. Choudhary. 166-173 [doi]
- Two phase transitions in the adaptive voter model based on the homophily principleTakashi Ishikawa. 174-179 [doi]
- Extremal optimization-based semi-supervised algorithm with conflict pairwise constraints for community detectionLei Li, Mei Du, Guanfeng Liu, Xuegang Hu, Gong-Qing Wu. 180-187 [doi]
- Accurately detecting trolls in Slashdot Zoo via declutteringSrijan Kumar, Francesca Spezzano, V. S. Subrahmanian. 188-195 [doi]
- Detecting highly overlapping community structure based on Maximal Clique NetworksPeng Wu, Li Pan. 196-199 [doi]
- An ant colony optimization method to detect communities in social networksSaeed Haji Seyed Javadi, Shahram Khadivi, Mohammad Ebrahim Shiri, Jia Xu. 200-203 [doi]
- Scanning network communities with power-law-distributed attributesTai Chi Wang, Frederick Kin Hing Phoa. 204-207 [doi]
- Do neighbor buddies make a difference in reblog likelihood? An analysis on SINA Weibo dataLumin Zhang, Jian Pei, Yan Jia, Bin Zhou, Xiang Wang. 208-215 [doi]
- "Can you really trust that seed?": Reducing the impact of seed noise in personalized PageRankShengyu Huang, Xinsheng Li, K. Selçuk Candan, Maria Luisa Sapino. 216-223 [doi]
- Discovering trust patterns in ego networksCuneyt Gurcan Akcora, Elena Ferrari. 224-229 [doi]
- Topic dynamics in Weibo: Happy Entertainment dominates but angry Finance is more periodicRui Fan, Jichang Zhao, Xu Feng, Ke Xu. 230-233 [doi]
- Time-aware reciprocity prediction in trust networkXu Feng, Jichang Zhao, Zhiwen Fang, Ke Xu. 234-237 [doi]
- A fuzzy clustering algorithm to detect criminals without prior informationChangjun Fan, Kaiming Xiao, Bao-Xin Xiu, Guodong Lv. 238-243 [doi]
- Towards understanding cyberbullying behavior in a semi-anonymous social networkHoma Hosseinmardi, Richard Han, Qin Lv, Shivakant Mishra, Amir Ghasemianlangroodi. 244-252 [doi]
- Measuring UK crime gangsGiles Oatley, Tom Crick. 253-256 [doi]
- MOSAIC: Criminal network analysis for multi-modal surveillance and decision supportPatrick Seidler, Richard Adderley, Atta Badii, Matteo Raffaelli. 257-260 [doi]
- Towards online anti-opinion spam: Spotting fake reviews from the review sequenceYuming Lin, Tao Zhu, Hao Wu, Jingwei Zhang, Xiaoling Wang, Aoying Zhou. 261-264 [doi]
- Exploiting rank-learning models to predict the diffusion of preferences on social networksChin-Hua Tsai, Jing-Kai Lou, Wan-Chen Lu, Shou-de Lin. 265-272 [doi]
- Learning the information diffusion probabilities by using variance regularized EM algorithmHai-Guang Li, Tianyu Cao, Zhao Li. 273-280 [doi]
- Cluster cascades: Infer multiple underlying networks using diffusion dataMing-Hao Yang, Chung-Kuang Chou, Ming-Syan Chen. 281-284 [doi]
- On macro and micro exploration of hashtag diffusion in TwitterYazhe Wang, Baihua Zheng. 285-288 [doi]
- SSRM: Structural social role mining for dynamic social networksAfra Abnar, Mansoureh Takaffoli, Reihaneh Rabbany, Osmar R. Zaïane. 289-296 [doi]
- Bio-inspired models for characterizing YouTube viewcoutCédric Richier, Eitan Altman, Rachid El Azouzi, Tania Jiménez, Georges Linares, Yonathan Portilla. 297-305 [doi]
- Social networks analysis and perception of social support of young mothers in the process of reconstruction: The social fabric of winter victims in the Colombian Caribbean (South America)Carolina S. Castro, Camilo A. Madariaga. 306-309 [doi]
- A semantic model for academic social network analysisJie Hu, Mengchi Liu, Junchi Zhang. 310-313 [doi]
- Are communities as strong as we think?Md Abdul Alim, Alan Kuhnle, My T. Thai. 314-319 [doi]
- Exploring user expertise and descriptive ability in community question answeringBaoguo Yang, Suresh Manandhar. 320-327 [doi]
- Min(e)d your tags: Analysis of Question response time in StackOverflowVasudev Bhat, Adheesh Gokhale, Ravi Jadhav, Jagat Sastry Pudipeddi, Leman Akoglu. 328-335 [doi]
- Question difficulty evaluation by knowledge gap analysis in Question Answer communitiesChih-Lu Lin, Ying-Liang Chen, Hung-Yu Kao. 336-339 [doi]
- Joint voting prediction for questions and answers in CQAYuan Yao, Hanghang Tong, Tao Xie, Leman Akoglu, Feng Xu, Jian Lu. 340-343 [doi]
- Empirical study on overlapping community detection in question and answer sitesZide Meng, Fabien L. Gandon, Catherine Faron-Zucker, Ge Song. 344-348 [doi]
- Data-mining twitter and the autism spectrum disorder: A Pilot studyAdham Beykikhoshk, Ognjen Arandjelovic, Dinh Q. Phung, Svetha Venkatesh, Terry Caelli. 349-356 [doi]
- On the endogenesis of Twitter's Spritzer and Gardenhose sample streamsDennis Kerg, Robert Roedler, Sebastian Seeber. 357-364 [doi]
- An analysis of positivity and negativity attributes of users in twitterMahnaz Roshanaei, Shivakant Mishra. 365-370 [doi]
- Identifying the community roles of social capitalists in the Twitter networkVincent Labatut, Nicolas Dugué, Anthony Perez. 371-374 [doi]
- Mention-anomaly-based Event Detection and tracking in TwitterAdrien Guille, Cécile Favre. 375-382 [doi]
- Detecting deception in Online Social NetworksJalal S. Alowibdi, Ugo A. Buy, Philip S. Yu, Leon Stenneth. 383-390 [doi]
- #tag: Meme or event?Dimitrios Kotsakos, Panos Sakkos, Ioannis Katakis, Dimitrios Gunopulos. 391-394 [doi]
- Identifying relevant event content for real-time event detectionXinyue Wang, Laurissa Tokarchuk, Stefan Poslad. 395-398 [doi]
- Finding social interaction patterns using call and proximity logs simultaneouslyYong-Jin Han, Shao Bo Cheng, Se-Young Park, Seong-Bae Park. 399-402 [doi]
- Geographic focus detection using multiple location taggersPhilipp Berger, Patrick Hennig, Dustin Glaeser, Hauke Klement, Christoph Meinel. 403-408 [doi]
- Online social media in the Syria conflict: Encompassing the extremes and the in-betweensDerek O'Callaghan, Nico Prucha, Derek Greene, Maura Conway, Joe Carthy, Padraig Cunningham. 409-416 [doi]
- Early detection of persistent topics in social networksShota Saito, Ryota Tomioka, Kenji Yamanishi. 417-424 [doi]
- Clearing contamination in large networksMichael Simpson, Venkatesh Srinivasan, Alex Thomo. 425-428 [doi]
- Influence inflation in online social networksJianjun Xie, Chuang Zhang, Ming Wu, Yun Huang. 435-442 [doi]
- Multi-objective optimization to identify key players in social networksR. Chulaka Gunasekara, Kishan G. Mehrotra, Chilukuri K. Mohan. 443-450 [doi]
- Influence in social networks: A unified model?Ajitesh Srivastava, Charalampos Chelmis, Viktor K. Prasanna. 451-454 [doi]
- Diversified social influence maximizationFangshuang Tang, Qi Liu, Hengshu Zhu, Enhong Chen, Feida Zhu. 455-459 [doi]
- A computational approach to measuring the correlation between expertise and social media influence for celebrities on microblogsWayne Xin Zhao, Jing Liu, Yulan He, Chin-Yew Lin, Ji-Rong Wen. 460-463 [doi]
- User characterization from geographic topic analysis in online social mediaJiangchuan Zheng, Siyuan Liu, Lionel M. Ni. 464-471 [doi]
- CRIMETRACER: Activity space based crime location predictionMohammad A. Tayebi, Martin Ester, Uwe Glässer, Patricia L. Brantingham. 472-480 [doi]
- A method for characterizing communities in dynamic attributed complex networksGünce Keziban Orman, Vincent Labatut, Marc Plantevit, Jean-François Boulicaut. 481-484 [doi]
- Who were you talking to - Mining interpersonal relationships from cellphone network dataMo Yu, Wenjun Si, Guojie Song, Zhenhui Li, John Yen. 485-490 [doi]
- Alike people, alike interests? A large-scale study on interest similarity in social networksXiao Han, Leye Wang, Soochang Park, Ángel Cuevas, Noël Crespi. 491-496 [doi]
- Agent-based simulation research on group emotion evolution of public emergencyBo Li, Duo-Yong Sun, Zi-Han Lin, Chaomin Ou. 497-502 [doi]
- Accelerate the detection of trends by using sentiment analysis within the blogospherePatrick Hennig, Philipp Berger, Claudia Lehmann, Andrina Mascher, Christoph Meinel. 503-508 [doi]
- Multi-label collective classification in multi-attribute multi-relational network dataPriyesh Vijayan, Shivashankar Subramanian, Balaraman Ravindran. 509-514 [doi]
- Penalized partial least squares for multi-label dataHuawen Liu, Zongjie Ma, Jianmin Zhao, Zhonglong Zheng. 515-520 [doi]
- A unified modularity by encoding the similarity attraction feature into the null modelXin Liu, Tsuyoshi Murata, Ken Wakita. 521-528 [doi]
- A multi-generational social learning model: The effect of information cascade on aggregate welfareMarziyeh Barghandan, Mohammad Malekzadeh, Atefeh Safdel, Iren Mazloomzadeh. 529-533 [doi]
- Inferring air pollution by sniffing social mediaShike Mei, Han Li, Jing Fan, Xiaojin Zhu, Charles R. Dyer. 534-539 [doi]
- ETAF: An extended trust antecedents framework for trust predictionGuibing Guo, Jie Zhang, Daniel Thalmann, Neil Yorke-Smith. 540-547 [doi]
- Persuasion driven influence propagation in social networksTerrence Leung, Fu-Lai Chung. 548-554 [doi]
- A novel algorithm for community detection and influence ranking in social networksWenjun Wang, W. Nick Street. 555-560 [doi]
- Leadership: Do networks matter?Yulia Tyshchuk, William A. Wallace, Kathryn Coronges. 561-565 [doi]
- Recommendation in Academia: A joint multi-relational modelZaihan Yang, Dawei Yin, Brian D. Davison 0001. 566-571 [doi]
- Social networks and quality of life: The national health interview surveyAzadeh Hemmati, Kon Shing Kenneth Chung. 572-579 [doi]
- Community discovery using social links and author-based sentiment topicsBaoguo Yang, Suresh Manandhar. 580-587 [doi]
- Field selection for job categorization and recommendation to social network usersEmmanuel Malherbe, Mamadou Diaby, Mario Cataldi, Emmanuel Viennet, Marie-Aude Aufaure. 588-595 [doi]
- Application of network analysis on healthcareFei Wang, Uma Srinivasan, Shahadat Uddin, Sanjay Chawla. 596-603 [doi]
- Populating knowledge base with collective entity mentions: A graph-based approachHailun Lin, Yantao Jia, Yuanzhuo Wang, Xiaolong Jin, Xiaojing Li, Xueqi Cheng. 604-611 [doi]
- Personalized paper recommendation in online social scholar systemHuan Xue, Jiafeng Guo, Yanyan Lan, Lei Cao. 612-619 [doi]
- Using sentiment to detect bots on Twitter: Are humans more opinionated than bots?John P. Dickerson, Vadim Kagan, V. S. Subrahmanian. 620-627 [doi]
- Adjustments to propensity score matching for network structuresMasoud Charkhabi. 628-633 [doi]
- Handling incomplete data using semantic logging based Social Network Analysis Hexagon for effective application monitoring and managementM. Omair Shafiq, Reda Alhajj, Jon G. Rokne. 634-641 [doi]
- Characterizing emotion entrainment in social mediaSaike He, Xiaolong Zheng, Xiuguo Bao, Hongyuan Ma, Daniel Dajun Zeng, Bo Xu, Changliang Li, Hongwei Hao. 642-648 [doi]
- SansText: Classifying temporal topic dynamics of Twitter cascades without tweet textShashidhar Sundereisan, Abhay Bhadriraju, M. Saquib Khan, Naren Ramakrishnan, B. Aditya Prakash. 649-656 [doi]
- OpenKN: An open knowledge computational engine for network big dataYantao Jia, Yuanzhuo Wang, Xueqi Cheng, Xiaolong Jin, Jiafeng Guo. 657-664 [doi]
- CAPER: Crawling and analysing Facebook for intelligence purposesCarlo Aliprandi, Antonio Ercole De Luca, Giulia Di Pietro, Matteo Raffaelli, Davide Gazzè, Mariantonietta Noemi La Polla, Andrea Marchetti, Maurizio Tesconi. 665-669 [doi]
- Online Naive Bayes classification for network intrusion detectionFatma Gumus, C. Okan Sakar, Zeki Erdem, Olcay Kursun. 670-674 [doi]
- Exploring UK crime networksGiles Oatley, Tom Crick. 675-678 [doi]
- Cascading failures of social networks under attacksChengqi Yi, Yuanyuan Bao, Jingchi Jiang, Yibo Xue, Yingfei Dong. 679-686 [doi]
- Understanding South Asian Violent Extremist Group-group interactionsDavid B. Skillicorn, Francesca Spezzano, V. S. Subrahmanian, M. Garber. 687-694 [doi]
- Semantic crawling: An approach based on Named Entity RecognitionGiulia Di Pietro, Carlo Aliprandi, Antonio Ercole De Luca, Matteo Raffaelli, Tiziana Soru. 695-699 [doi]
- Prediction and analysis of Pakistan election 2013 based on sentiment analysisMuhammad Asif Razzaq, Ali Mustafa Qamar, Hafiz Syed Muhammad Bilal. 700-703 [doi]
- The security awareness paradox: A case studyMuhammad Adnan Tariq, Joel Brynielsson, Henrik Artman. 704-711 [doi]
- Estimating the size of hidden data sources by queriesYan Wang, Jie Liang, Jianguo Lu. 712-719 [doi]
- OSINT for B2B platformsV. F. Pais, D. S. Ciobanu. 720-723 [doi]
- Detecting key individuals in terrorist network based on FANP modelZe Li, Duo-Yong Sun, Shu-Quan Guo, Bo Li. 724-727 [doi]
- Big Data in Health Informatics ArchitectureEgondu Rosemary Onyejekwe. 728-736 [doi]
- Improving energetic feature selection to classify protein-protein interactionsTatiana Gutierrez-Bunster, Germán Poo-Caamano. 737-743 [doi]
- How do biological networks differ from social networks? (an experimental study)Tatiana Gutierrez-Bunster, Ulrike Stege, Alex Thomo, John Taylor. 744-751 [doi]
- Evidence from the randomized controlled trials of Traditional Chinese Medicine compound in treating Alzheimer's diseaseXue-Qin Hou, Yue Li, Jian-Li Qiu, Feng Huang. 752-758 [doi]
- A fast sorting algorithm for aptamer identification using deep sequencingYiou Xiao, Kishan G. Mehrotra, Damian G. Allis, Phillip N. Borer. 759-763 [doi]
- Tracking dynamic community evolution in social networksZeineb Dhouioui, Jalel Akaichi. 764-770 [doi]
- Competition between real-life friends and virtual-life friendsBin Fang, Qiang Ye. 771-777 [doi]
- Location inference using microblog text and friendshipsChuanyang Li, Xiuqin Lin, Bin Wu, Chuan Shi. 778-784 [doi]
- Sentiment analysis of microblog combining dictionary and rulesDing Yuan, Yanquan Zhou, Ruifan Li, Peng Lu. 785-789 [doi]
- Using single source data to better understand User-generated Content (UGC) behaviorHeng Lu, Jonathan J. H. Zhu. 790-795 [doi]
- Research and implementation of algorithm for short videos recommendationLai Jiang, Xiangling Fu. 796-801 [doi]
- The comparison study on the motivations of staffs' behaviors on public and enterprise social network: Evidence from ChinaMiaomiao Xiong, Qing Chen, Angela Zhao. 802-807 [doi]
- Structural and regular equivalence of community detection in social networksSovatana Hour, Li Kan. 808-813 [doi]
- UGC collection strategy oriented user influence classification and feature analysisYue Zhai, Lei Li. 814-819 [doi]
- Research on the selecting mechanism of individual interactive object for online social networkYujie Pang, Shiyu Du. 820-827 [doi]
- Associations between personal social network properties and mental health in cancer careAzadeh Hemmati, Kon Shing Kenneth Chung. 828-835 [doi]
- A study of age and gender seen through mobile phone usage patterns in MexicoCarlos Sarraute, Pablo Blanc, Javier Burroni. 836-843 [doi]
- Dynamic feedback mechanism for maximizing interaction in online social network servicesKyudong Park, Seungjae Oh, Heung-Chang Lee, Hyo-Jeong So. 844-849 [doi]
- Activity profiles in online social mediaMohamed Faouzi Atig, Sofia Cassel, Lisa Kaati, Amendra Shrestha. 850-855 [doi]
- Extension of Modularity Density for overlapping community structureMingming Chen, Konstantin Kuzmin, Boleslaw K. Szymanski. 856-863 [doi]
- The same network - different communities? The multidimensional study of groups in the cyberspaceRadoslaw Michalski, Jaroslaw Jankowski, Piotr Bródka, Przemyslaw Kazienko. 864-869 [doi]
- Local representatives in weighted networksSarka Zehnalova, Milos Kudelka, Jan Platos, Zdenek Horak. 870-875 [doi]
- PEVNET: A framework for visualization of criminal networksAmer Rasheed, Uffe Kock Wiil. 876-881 [doi]
- Incremental solutions to online multi-unit combinatorial auctions for information feedbackSivaraman Ramanathan, Avinash Kasinathan, Anup K. Sen. 882-889 [doi]
- Analysis of two crime-related networks derived from bipartite social networksTaher Alzahrani, Kathy J. Horadam. 890-897 [doi]
- Link discovery in social networksFlavio Cirillo, Tobias Jacobs. 898-905 [doi]
- Optimal strategies for targeted influence in signed networksBasak Guler, Burak Varan, Kaya Tutuncuoglu, Mohamed S. Nafea, Ahmed A. Zewail, Aylin Yener, Damien Octeau. 906-911 [doi]
- Rumors detection in Chinese via crowd responsesGuoyong Cai, Hao Wu, Rui Lv. 912-917 [doi]
- A novel method for computer video leaking signal detectionJun Shi, Wei-qing Huang, Dong Wei, De-gang Sun. 918-923 [doi]
- Simpler is better? Lexicon-based ensemble sentiment classification beats supervised methodsLukasz Augustyniak, Tomasz Kajdanowicz, Piotr Szymanski, Wlodzimierz Tuliglowicz, Przemyslaw Kazienko, Reda Alhajj, Boleslaw K. Szymanski. 924-929 [doi]
- Automatically identifying experts in on-line support forums using social interactions and post contentTyler Munger, Jiabin Zhao. 930-935 [doi]
- Community-based cheater detection in location-based social networksWenjie Fan, Wei Fan, Stephen Shaoyi Liao, Alan Kai-Hau Yeung. 936-941 [doi]
- SDHM: A hybrid model for spammer detection in WeiboYu Liu, Bin Wu, Bai Wang, Guanchen Li. 942-947 [doi]
- Using global diversity and local features to identify influential social network spreadersYu-Hsiang Fu, Chung-Yuan Huang, Chuen-Tsai Sun. 948-953 [doi]
- Epdemic spreading model based overlapping community detectionYing Wen, Yuanhao Chen, Xiaolong Deng. 954-959 [doi]
- Tag-based expert recommendation in community question answeringBaoguo Yang, Suresh Manandhar. 960-963 [doi]
- Tell me who your friends are and I'll tell you who you are: Studying the evolution of collaborations in research environmentsMario Cataldi, Myriam Lamolle, Luigi Di Caro, Claudio Schifanella. 964-967 [doi]