Abstract is missing.
- Multi-scale Resolution of Cognitive Architectures: A Paradigm for Simulating Minds and SocietyMark G. Orr, Christian Lebiere, Andrea Stocco, Peter Pirolli, Bianica Pires, William G. Kennedy. 3-15 [doi]
- Detecting Betrayers in Online Environments Using Active IndicatorsPaola Rizzo, Chaima Jemmali, Alice Leung, Karen Haigh, Magy Seif El-Nasr. 16-27 [doi]
- Forecasting Gang Homicides with Multi-level Multi-task LearningNasrin Akhter, Liang Zhao, Desmond Arias, Huzefa Rangwala, Naren Ramakrishnan. 28-37 [doi]
- Feature Selection of Post-graduation Income of College Students in the United StatesEwan Wright, Qiang Hao, Khaled Rasheed, Yan Liu. 38-45 [doi]
- From Language to Location Using Multiple Instance Neural NetworksSneha Nagpaul, Huzefa Rangwala. 46-53 [doi]
- Detecting Agreement and Disagreement in Political DebatesMahboubeh Ahmadalinezhad, Masoud Makrehchi. 54-60 [doi]
- Tipping Points for Norm Change in Human CulturesSoham De, Dana S. Nau, Xinyue Pan, Michele J. Gelfand. 61-69 [doi]
- Model Co-creation from a Modeler's Perspective: Lessons Learned from the Collaboration Between Ethnographers and ModelersJose J. Padilla, Erika Frydenlund, Hege Wallewik, Hanne Haaland. 70-75 [doi]
- Multi-Agent Accumulator-Based Decision-Making Model of Incivility (MADI)Jordan Richard Schoenherr, Kim Nguyen. 76-81 [doi]
- Legislative Voting Dynamics in UkraineThomas Magelinski, Kathleen M. Carley. 82-88 [doi]
- Stop Words Are Not "Nothing": German Modal Particles and Public Engagement in Social MediaFabian Rüsenberg, Andrew J. Hampton, Valerie L. Shalin, Markus A. Feufel. 89-96 [doi]
- Beaten Up on Twitter? Exploring Fake News and Satirical Responses During the Black Panther Movie EventMatthew Babcock, David M. Beskow, Kathleen M. Carley. 97-103 [doi]
- #metoo Through the Lens of Social MediaLydia Manikonda, Ghazaleh Beigi, Subbarao Kambhampati, Huan Liu 0001. 104-110 [doi]
- An Agent-Based Model for False Belief Tasks: Belief Representation Systematic Approach (BRSA)Zahrieh Yousefi, Dietmar Heinke, Ian Apperly, Peer-Olaf Siebers. 111-126 [doi]
- Similar but Different: Exploiting Users' Congruity for Recommendation SystemsGhazaleh Beigi, Huan Liu 0001. 129-140 [doi]
- Mining Help Intent on Twitter During Disasters via Transfer Learning with Sparse CodingBahman Pedrood, Hemant Purohit. 141-153 [doi]
- People2Vec: Learning Latent Representations of Users Using Their Social-Media ActivitiesSumeet Kumar, Kathleen M. Carley. 154-163 [doi]
- Finding Organizational Accounts Based on Structural and Behavioral Factors on TwitterSultan Alzahrani, Chinmay Gore, Amin-Salehi, Hasan Davulcu. 164-175 [doi]
- A Study of How Opinion Sharing Affects Emergency EvacuationAravinda Ramakrishnan Srinivasan, Farshad Salimi Naneh Karan, Subhadeep Chakraborty. 176-182 [doi]
- Fine-Scale Prediction of People's Home Location Using Social Media FootprintsHamdi Kavak, Daniele Vernon-Bido, Jose J. Padilla. 183-189 [doi]
- Formal Organizations, Informal Networks, and Work Flow: An Agent-Based ModelThomas W. Briggs. 190-196 [doi]
- Aspect Level Sentiment Classification with Attention-over-Attention Neural NetworksBinxuan Huang, Yanglan Ou, Kathleen M. Carley. 197-206 [doi]
- Analyzing Social Bots and Their Coordination During Natural DisastersTuja Khaund, Samer Al-khateeb, Serpil Tokdemir, Nitin Agarwal. 207-212 [doi]
- Sentiment Dynamics of The Chronicles of Narnia and Their RankingKaiyun Dai, Menglan Ma, Jianbo Gao. 213-219 [doi]
- Sign Prediction in Signed Social Networks Using Inverse Squared MetricMahboubeh Ahmadalinezhad, Masoud Makrehchi. 220-227 [doi]
- Detecting and Characterizing Bot-Like Behavior on TwitterSiHua Qi, Lulwah Alkulaib, David A. Broniatowski. 228-232 [doi]
- Initializing Agent-Based Models with Clustering ArchetypesSamaneh Saadat, Chathika Gunaratne, Nisha Baral, Gita Sukthankar, Ivan Garibay. 233-239 [doi]
- Predicting Alcoholism Recovery from TwitterJennifer Golbeck. 243-252 [doi]
- The Portrayal of Quit Emotions: Content-Sensitive Analysis of Peer Interactions in an Online Community for Smoking CessationVishnupriya Sridharan, Trevor Cohen, Nathan K. Cobb, Sahiti Myneni. 253-262 [doi]
- Digilego: A Standardized Analytics-Driven Consumer-Oriented Connected Health FrameworkSahiti Myneni, Deevakar Rogith, Amy Franklin. 263-273 [doi]
- Pain Town, an Agent-Based Model of Opioid Use Trajectories in a Small CommunityGeorgiy V. Bobashev, Sam Goree, Jennifer Frank, William A. Zule. 274-285 [doi]
- Assessing Target Audiences of Digital Public Health Campaigns: A Computational ApproachRobert F. Chew, Annice Kim, Vivian Chen, Paul Ruddle, Antonio Morgan-Lopez. 286-291 [doi]
- Evaluating Semantic Similarity for Adverse Drug Event NarrativesHameeduddin Irfan Khaja, Marie Abate, Wanhong Zheng, Ahmed Abbasi, Donald A. Adjeroh. 292-299 [doi]
- Framing Shifts of the Ukraine Conflict in pro-Russian News MediaSultan Alzahrani, Nyunsu Kim, Mert Ozer, Scott W. Ruston, Jason Schlachter, Steven R. Corman. 303-314 [doi]
- Turning Narrative Descriptions of Individual Behavior into Network Visualization and Analysis: Example of Terrorist Group DynamicsGeorgiy Bobashev, Marc Sageman, Amanda Lewis Evans, John Wittenborn, Robert F. Chew. 315-328 [doi]
- Terrorist Network Monitoring with Identifying CodeArunabha Sen, Victoria Horan Goliber, Chenyang Zhou, Kaustav Basu. 329-339 [doi]
- Implicit Terrorist Networks: A Two-Mode Social Network Analysis of Terrorism in IndiaRithvik Yarlagadda, Diane Felmlee, Dinesh Verma, Scott Gartner. 340-347 [doi]
- Complex Networks for Terrorist Target PredictionGian Maria Campedelli, Iain Cruickshank, Kathleen M. Carley. 348-353 [doi]
- Searching for Unknown Unknowns: Unsupervised Bot Detection to Defeat an Adaptive AdversaryPeter A. Chew. 357-366 [doi]
- Using Random String Classification to Filter and Annotate Automated AccountsDavid M. Beskow, Kathleen M. Carley. 367-376 [doi]
- Understanding Cyber Attack Behaviors with Sentiment Information on Social MediaKai Shu, Amy Sliva, Justin Sampson, Huan Liu 0001. 377-388 [doi]
- Social Cyber-SecurityKathleen M. Carley, Guido Cervone, Nitin Agarwal, Huan Liu. 389-394 [doi]
- A Computational Model of Cyber Situational AwarenessGeoffrey B. Dobson, Kathleen M. Carley. 395-400 [doi]
- Assessment of Group Dynamics During Cyber Crime Through Temporal Network TopologyNima Asadi, Aunshul Rege, Zoran Obradovic. 401-407 [doi]