Abstract is missing.
- Sociometric Methods for Relevancy Analysis of Long Tail Science DataArcot Rajasekar, Sharlini Sankaran, Howard Lander, Tom Carsey, Jonathan David Crabtree, Hye-Chung Kum, Mercè Crosas, Gary King, Justin Zhan. 1-6 [doi]
- Scaling Deep Social Feeds at PinterestVarun Sharma, Jeremy Carroll, Abhi Khune. 7-12 [doi]
- MultiScale Modeling of Islamic Organizations in UKNyunsu Kim, Sukru Tikves, Zheng Wang, Jonathan Githens-Mazer, Hasan Davulcu. 13-18 [doi]
- Understanding Information Credibility on TwitterSujoy Sikdar, Byungkyu Kang, John O'Donovan, Tobias Höllerer, Sibel Adah. 19-24 [doi]
- Incongruity Versus Incongruity ResolutionAmogh Mahapatra, Jaideep Srivastava. 25-32 [doi]
- Bayesian Security Games for Controlling ContagionJason Tsai, Yundi Qian, Yevgeniy Vorobeychik, Christopher Kiekintveld, Milind Tambe. 33-38 [doi]
- Trending Topics on Twitter Improve the Prediction of Google Hot QueriesFederica Giummolè, Salvatore Orlando, Gabriele Tolomei. 39-44 [doi]
- The Effect of Caching on a Model of Content and Access Provider Revenues in Information-centric NetworksFatih Kocak, George Kesidis, T.-M. Pham, Serge Fdida. 45-50 [doi]
- Model-Driven Development of Information Flow-Secure Systems with IFlowKuzman Katkalov, Kurt Stenzel, Marian Borek, Wolfgang Reif. 51-56 [doi]
- How Increased Awareness Can Impact Attitudes and Behaviors toward Online Privacy ProtectionDelfina Malandrino, Vittorio Scarano, Raffaele Spinelli. 57-62 [doi]
- Using Stochastic Models to Predict User Response in Social MediaTad Hogg, Kristina Lerman, Laura M. Smith. 63-68 [doi]
- Hoodsquare: Modeling and Recommending Neighborhoods in Location-Based Social NetworksAmy X. Zhang, Anastasios Noulas, Salvatore Scellato, Cecilia Mascolo. 69-74 [doi]
- A Place-Focused Model for Social Networks in CitiesChloë Brown, Anastasios Noulas, Cecilia Mascolo, Vincent Blondel. 75-80 [doi]
- Does Love Change on Twitter? The Dynamics of Topical Conversations in MicrobloggingVictoria Lai, William Rand. 81-86 [doi]
- Quantifying Social Influence in EpinionsAkshay Patil, Golnaz Ghasemiesfeh, Roozbeh Ebrahimi, Jie Gao. 87-92 [doi]
- Gang Networks, Neighborhoods and Holidays: Spatiotemporal Patterns in Social MediaNibir Bora, Vladimir Zaytsev, Yu-Han Chang, Rajiv T. Maheswaran. 93-101 [doi]
- Predictability of User Behavior in Social Media: Bottom-Up v. Top-Down ModelingDavid Darmon, Jared Sylvester, Michelle Girvan, William Rand. 102-107 [doi]
- Towards an Attribute Based Constraints Specification LanguageKhalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu. 108-113 [doi]
- Privacy-Preserving Data Publishing Based on Utility SpecificationHongwei Tian, Weining Zhang. 114-121 [doi]
- On Measuring the Quality of a Network Community StructureMingming Chen, Tommy Nguyen, Boleslaw K. Szymanski. 122-127 [doi]
- Multi-tweet Summarization of Real-Time EventsMuhammad Asif Hossain Khan, Danushka Bollegala, Guangwen Liu, Kaoru Sezaki. 128-133 [doi]
- SMAC: Subgraph Matching and Centrality in Huge Social NetworksNoseong Park, Michael Ovelgönne, V. S. Subrahmanian. 134-141 [doi]
- Direct Negative Opinions in Online DiscussionsClaudiu Cristian Musat, Boi Faltings, Philippe Rousille. 142-147 [doi]
- Bandit Algorithms for Social Network QueriesZahy Bnaya, Rami Puzis, Roni Stern, Ariel Felner. 148-153 [doi]
- Analyzing Community Core Evolution in Mobile Social NetworksHao Xu, Zhenwen Wang, Weidong Xiao. 154-161 [doi]
- Latent Interest-Group Discovery and Management by Peer-to-Peer Online Social NetworksJianping He, David J. Miller 0001, George Kesidis. 162-167 [doi]
- Partitioning and Scaling Signed Bipartite Graphs for Polarized Political BlogosphereSedat Gokalp, M'hamed H. Temkit, Hasan Davulcu, Ismail Hakki Toroslu. 168-173 [doi]
- Predicting Spending Behavior Using Socio-mobile FeaturesVivek K. Singh, Laura Freeman, Bruno Lepri, Alex Pentland. 174-179 [doi]
- Automatic Classification and Analysis of Interdisciplinary Fields in Computer SciencesTanmoy Chakraborty 0002, Srijan Kumar, M. Dastagiri Reddy, Suhansanu Kumar, Niloy Ganguly, Animesh Mukherjee. 180-187 [doi]
- StackOverflow and GitHub: Associations between Software Development and Crowdsourced KnowledgeBogdan Vasilescu, Vladimir Filkov, Alexander Serebrenik. 188-195 [doi]
- Children's Exposure to Mobile In-App Advertising: An Analysis of Content AppropriatenessYing Chen, Sencun Zhu, Heng Xu, Yilu Zhou. 196-203 [doi]
- Parallel Overlapping Community Detection with SLPAKonstantin Kuzmin, S. Yousaf Shah, Boleslaw K. Szymanski. 204-212 [doi]
- Applications of Social Networks and Crowdsourcing for Disaster Management ImprovementLiliya I. Besaleva, Alfred C. Weaver. 213-219 [doi]
- A Job Interview Simulation: Social Cue-Based Interaction with a Virtual CharacterTobias Baur, Ionut Damian, Patrick Gebhard, Kaska Porayska-Pomsta, Elisabeth André. 220-227 [doi]
- Understanding How Learning Affects Agreement Process in Social NetworksSuman Kalyan Maity, Abhishek Porwal, Animesh Mukherjee. 228-235 [doi]
- The Role of Social Media in the Discussion of Controversial TopicsLaura M. Smith, Linhong Zhu, Kristina Lerman, Zornitsa Kozareva. 236-243 [doi]
- Simulating Team Formation in Social NetworksNathaniel Dykhuis, Paul R. Cohen, Yu-Han Chang. 244-253 [doi]
- Crawling Credible Online Medical Sentiments for Social IntelligenceAhmed Abbasi, Tianjun Fu, Daniel Zeng, Donald A. Adjeroh. 254-263 [doi]
- A Structure for Opinion in Social DomainsMostafa Karamibekr, Ali A. Ghorbani. 264-271 [doi]
- Finding Participants in a Chat: Authorship Attribution for Conversational DocumentsGiacomo Inches, Morgan Harvey, Fabio Crestani. 272-279 [doi]
- Spatio-temporal Signal Recovery from Political Tweets in IndonesiaAnisha Mazumder, Arun Das, Nyunsu Kim, Sedat Gokalp, Arunabha Sen, Hasan Davulcu. 280-287 [doi]
- Effect of Vaccination Strategies on the Herd Immunity of Growing NetworksMahendra Piraveenan, Shahadat Uddin, Gnana Thedchanamoorthy. 288-294 [doi]
- Self-Reported Social Network Behavior: Accuracy Predictors and Implications for the Privacy ParadoxJessica Staddon, Alessandro Acquisti, Kristen LeFevre. 295-302 [doi]
- Religious Politicians and Creative Photographers: Automatic User Categorization in TwitterClaudia Wagner, Sitaram Asur, Joshua M. Hailpern. 303-310 [doi]
- Twitter, Public Opinion, and the 2011 Nigerian Presidential ElectionClayton Fink, Nathan Bos, Alexander Perrone, Edwina Liu, Jonathon Kopecky. 311-320 [doi]
- Faster Clustering Coefficient Using Vertex CoversOded Green, David A. Bader. 321-330 [doi]
- Modeling Attrition in Organizations from Email CommunicationAkshay Patil, Juan Liu, Jianqiang Shen, Oliver Brdiczka, Jie Gao, John Hanley. 331-338 [doi]
- Entity Matching in Online Social NetworksOlga Peled, Michael Fire, Lior Rokach, Yuval Elovici. 339-344 [doi]
- A : ) Is Worth a Thousand Words: How People Attach Sentiment to Emoticons and Words in TweetsMarina Boia, Boi Faltings, Claudiu Cristian Musat, Pearl Pu. 345-350 [doi]
- A Community Based Social Recommender System for Individuals & GroupsMaryam Fatemi, Laurissa Tokarchuk. 351-356 [doi]
- Twitter Sentiment Analysis: A Bootstrap Ensemble FrameworkAmmar Hassan, Ahmed Abbasi, Daniel Zeng. 357-364 [doi]
- Tracking Visitor Engagement in the Blogosphere for Leveraging RankingsPatrick Hennig, Philipp Berger, Christoph Meinel, Maria Graber, Jens Hildebrandt, Stefan Lehmann, Cathleen Ramson. 365-372 [doi]
- An Evaluation of the Effect of Spam on Twitter Trending TopicsGrant Stafford, Louis Lei Yu. 373-378 [doi]
- Friendship Prediction on Social Network UsersKuan-Hsi Chen, Tyne Liang. 379-384 [doi]
- Cumulative Probability Distribution Model for Evaluating User Behavior Prediction AlgorithmsHaifeng Liu, Zheng Hu, Dian Zhou, Hui Tian. 385-390 [doi]
- News and Sentiment Analysis of the European Market with a Hybrid Expert Weighting AlgorithmGermán Creamer, Yong Ren, Yasuaki Sakamoto, Jeffrey V. Nickerson. 391-396 [doi]
- Evaluating the Performance of Social Networks of Sensors under Different Mobility ModelsMarcello Tomasini, Franco Zambonelli, Angelo Brayner, Ronaldo Menezes. 397-402 [doi]
- Automatic Event Scheduling in Mobile Social Network CommunitiesVaskar Raychoudhury, Ajay D. Kshemkalyani, Daqing Zhang, Jiannong Cao, Mohit Bakshi, Kanik Gupta, Vishal Mittal, Siddharth Maheshwari. 403-410 [doi]
- Risk Management in the Era of BYOD: The Quintet of Technology Adoption, Controls, Liabilities, User Perception, and User BehaviorT. Andrew Yang, Radu E. Vlas, Alan Yang, Cristina Vlas. 411-416 [doi]
- On the Efficient Processing of Multilevel Secure Continuous QueriesXing Xie, Indrakshi Ray, Raman Adaikkalavan. 417-422 [doi]
- ACaaS: Access Control as a Service for IaaS CloudRuoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi, Haiyong Xie. 423-428 [doi]
- Enforcing Trust Preferences in Mobile Person-to-Person PaymentsBarbara Carminati, Elena Ferrari, Ngoc Hong Tran. 429-434 [doi]
- Access Control Policy Extraction from Unconstrained Natural Language TextJohn Slankas, Laurie Williams. 435-440 [doi]
- A Conjunction for Private Stream SearchingMichael Oehler, Dhananjay S. Phatak. 441-447 [doi]
- A Security Analysis of Two Commercial Browser and Cloud Based Password ManagersRui Zhao, Chuan Yue, Kun Sun. 448-453 [doi]
- Towards a Framework for Privacy-Aware Mobile CrowdsourcingYang Wang 0005, Yun Huang, Claudia Louis. 454-459 [doi]
- Privacy Framework for Open EnvironmentsAfshan Samani, Adrian T. Beinkowski, Raafat Aburukba, Hamada Ghenniwa. 460-467 [doi]
- Measuring Inherent Privacy Concern and Desire for Privacy - A Pilot Survey Study of an Instrument to Measure Dispositional Privacy ConcernAnthony Morton. 468-477 [doi]
- Managing Risk in Secure System: Antecedents to System Engineers' Trust Assumptions DecisionsPatrick I. Offor. 478-485 [doi]
- Preservation of Centrality Measures in Anonymized Social NetworksYasmeen Alufaisan, Alina Campan. 486-493 [doi]
- Real-Time Access Control Rule Fault Detection Using a Simulated Logic CircuitVincent C. Hu, Karen Scarfone. 494-501 [doi]
- Security Policy Refinement: High-Level Specification to Low-Level ImplementationXia Yang, Jim Alves-Foss. 502-511 [doi]
- "I Like" - Analysing Interactions within Social Networks to Assert the Trustworthiness of Users, Sources and ContentOwen Sacco, John G. Breslin. 512-519 [doi]
- An Analysis Grid for Privacy-Related Properties of Social Network SystemsRegina Marin, Guillaume Piolle, Christophe Bidan. 520-525 [doi]
- The Impact of Anonymity in Online CommunitiesEli Omernick, Sara Owsley Sood. 526-535 [doi]
- Bot Detection Based on Social Interactions in MMORPGsJehwan Oh, Zoheb Hassan Borbora, Dhruv Sharma, Jaideep Srivastava. 536-543 [doi]
- Access Control Policy Misconfiguration Detection in Online Social NetworksYousra Javed, Mohamed Shehab. 544-549 [doi]
- Event Driven Monitoring of Composite ServicesMuhammad Asim, David Llewellyn-Jones, Brett Lempereur, Bo Zhou, Qi Shi, Madjid Merabti. 550-557 [doi]
- Game Theoretic Framework for Reputation-Based Distributed Intrusion DetectionAmira Bradai, Hossam Afifi. 558-563 [doi]
- Preprocess before You Build: Introducing a Framework for Privacy Requirements EngineeringPeter J. Radics, Denis Gracanin, Dennis G. Kafura. 564-569 [doi]
- Understanding Site-Based Inference Potential for Identifying Hidden AttributesW. Brad Moore, Yifang Wei, Adam Orshefsky, Micah Sherr, Lisa Singh, Hui Yang. 570-577 [doi]
- In Guards We Trust: Security and Privacy in Operating Systems RevisitedMichael Hanspach, Jörg Keller. 578-585 [doi]
- Information Security Risk Management in a World of ServicesVincent Lalanne, Manuel Munier, Alban Gabillon. 586-593 [doi]
- Threat Modeling for Security Failure-Tolerant RequirementsMichael Shin, Swetha Dorbala, Dongsoo Jang. 594-599 [doi]
- The Potential of an Individualized Set of Trusted CAs: Defending against CA Failures in the Web PKIJohannes Braun, Gregor Rynkowski. 600-605 [doi]
- Controlling Break-the-Glass through AlignmentArya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone. 606-611 [doi]
- A PET Evaluation Framework for Relational DatabasesHendrik J. G. Oberholzer, Sunday O. Ojo, Oludayo O. Olugbara. 612-617 [doi]
- Maximizing Investigation Effectiveness in Digital Forensic CasesEzhil Kalaimannan, Jatinder N. D. Gupta, Seong-Moo Yoo. 618-623 [doi]
- A Semantic Framework for Content-Based Access ControlsSharon Paradesi, Ilaria Liccardi, Lalana Kagal, Joe Pato. 624-629 [doi]
- Secure Execution Context Enforcement Framework Based on Activity Detection on Data and Applications Hosted on Smart DevicesYair Diaz-Tellez, Eliane L. Bodanese, Fadi El-Moussa, Theo Dimitrakos. 630-636 [doi]
- Abstracted Architecture for Smart Grid Privacy AnalysisJussi Laakkonen, Salla Annala, Pekka Jäppinen. 637-646 [doi]
- A Framework for Secure Service CompositionAchim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou. 647-652 [doi]
- Identity-Based Symmetric Private Set IntersectionShuo Qiu, Jiqiang Liu, Yanfeng Shi. 653-658 [doi]
- Privacy Measurement for Social Network Actor ModelYong Wang, Raj Kumar Nepali. 659-664 [doi]
- Effective Method for Promoting Viral Marketing in MicroblogXiang Li, Shaoyin Cheng, Wenlong Chen, Fan Jiang. 665-670 [doi]
- Exploring Image Virality in Google PlusMarco Guerini, Jacopo Staiano, Davide Albanese. 671-678 [doi]
- Comparing Tag Clustering Algorithms for Mining Twitter Users' InterestsSandra Servia Rodríguez, Ana Fernández Vilas, Rebeca P. Díaz Redondo, José J. Pazos Arias. 679-684 [doi]
- Towards Network Reduction on Big DataXing Fang, Justin Zhan, Nicholas Koceja. 685-690 [doi]
- Composing Data Parallel Code for a SPARQL Graph EngineVito Giovanni Castellana, Antonino Tumeo, Oreste Villa, David Haglin, John Feo. 691-699 [doi]
- Key Recovery Using Noised Secret Sharing with Discounts over Large CloudsSushil Jajodia, Witold Litwin, Thomas J. E. Schwarz. 700-707 [doi]
- An Empirical Comparison of Graph DatabasesSalim Jouili, Valentin Vansteenberghe. 708-715 [doi]
- State History Tree: An Incremental Disk-Based Data Structure for Very Large Interval DataA. Montplaisir-Goncalves, Naser Ezzati Jivan, Florian Wininger, Michel R. Dagenais. 716-724 [doi]
- Natural Language Processing and Big Data - An Ontology-Based Approach for Cross-Lingual Information RetrievalJohanna Monti, Mario Monteleone, Maria Pia di Buono, Federica Marano. 725-731 [doi]
- imGraph: A Distributed In-Memory Graph DatabaseSalim Jouili, Aldemar Reynaga. 732-737 [doi]
- A Dynamic Replication Mechanism to Reduce Response-Time of I/O Operations in High Performance Computing ClustersEhsan Mousavi Khaneghah, Seyedeh Leili Mirtaheri, Lucio Grandinetti, Amir Saman Memaripour, Mohsen Sharifi. 738-743 [doi]
- Emissions Abating Technology Adoption under the SO2 Permit Market: A Social Networks ApproachBernardo Creamer, Germán Creamer. 744-749 [doi]
- Impact of a Non-linear Pay-Off Function on Pairwise Stable Collaborative OligopoliesShaun Lichter, Terry L. Friesz, Christopher Griffin. 750-755 [doi]
- Rating Equity Funds against Return of Random TradersTa-Wei Hung, Mu-En Wu, Hsueh-I. Lu, Jan-Ming Ho. 756-761 [doi]
- A Dynamic Pricing Game in a Model of New Product Adoption with Social InfluenceHenry Thille, Monica Cojocaru, Edward W. Thommes, Dominic Nelson, Scott Greenhalgh. 762-767 [doi]
- Three Fiscal Policy Experiments in an Agent-Based Macroeconomic ModelCarl M. Gustafson. 768-773 [doi]
- A Serious Game Based on a Public Goods ExperimentMárcia Baptista, Hugo Damas, Joana Dimas, Guilherme Raimundo, Rui Prada, Carlos Martinho, Pedro Alexandre Santos, Jorge F. Peña. 774-781 [doi]
- FinancialCloud: Open Cloud Framework of Derivative PricingHsin-Tsung Peng, William W. Y. Hsu, Chih Hung Chen, Feipei Lai, Jan-Ming Ho. 782-789 [doi]
- Happiness Recognition from Mobile Phone DataAndrey Bogomolov, Bruno Lepri, Fabio Pianesi. 790-795 [doi]
- Automatic Labeling of Training Data for Collecting Tweets for Ambiguous TV Program TitlesMaike Erdmann, Erik Ward, Kazushi Ikeda, Gen Hattori, Chihiro Ono, Yasuhiro Takishima. 796-802 [doi]
- GeoEvents - An Interactive Tool to Analyze and Visualize Spatial Information from the Social WebCaroline Sabty, Martin Memmel, Slim Abdennadher. 803-808 [doi]
- Impact of Dynamic Corporate News Networks on Asset Return and VolatilityGermán Creamer, Yong Ren, Jeffrey V. Nickerson. 809-814 [doi]
- K-Partitioning of Signed or Weighted Bipartite GraphsNurettin B. Omeroglu, Ismail H. Toroslu, Sedat Gokalp, Hasan Davulcu. 815-820 [doi]
- Popularity Prediction of Social Multimedia Based on Concept DriftShih-Hong Jheng, Cheng-Te Li, Hsi-Lin Chen, Man-Kwan Shan. 821-826 [doi]
- Support Vector Machine Based Detection of Drowsiness Using Minimum EEG FeaturesShaoda Yu, Peng Li, Honghuang Lin, Ehsan Rohani, Gwan Choi, Botang Shao, Qian Wang. 827-835 [doi]
- Finding Number of Clusters in a Gene Co-expression Network Using Independent SetsHarun Pirim. 836-839 [doi]
- Synthetic Biology Driven by Harnessing Forces of Disruptive InnovationMelvin Greer, Manuel Rodriguez-Martinez, Jaime Seguel. 840-845 [doi]
- Classification of MRI Images for Alzheimer's Disease DetectionLuis Javier Herrera, Ignacio Rojas, Héctor Pomares, Alberto Guillén, Olga Valenzuela, Oresti Baños. 846-851 [doi]
- Towards Obesity Causes, Prevalence and PreventionAhmad Albu-Shamah, Justin Zhan. 852-857 [doi]
- Precision Controlled Variable Phase Filter for Imaging Type Two-Dimensional Spectroscopic TomographyPradeep Kumara Wijesekara Abeygunawardhana, Satoru Suzuki, Ichirou Ishimaru, Akira Nishiyama. 858-863 [doi]
- Programmable Hardware Based Short Read Aligner Using Phred Quality ScoresMehmet Yagmur Gok, Mahmut S. Sagiroglu, Cem Ünsalan, Sezer Gören. 864-867 [doi]
- Conceptual Quantification of the Dynamicity of Longitudinal Social NetworksShahadat Uddin, Mahendra Piraveenan, Arif Khan, Babak Amiri. 868-873 [doi]
- Ego-centric Graphlets for Personality and Affective States RecognitionStefano Teso, Jacopo Staiano, Bruno Lepri, Andrea Passerini, Fabio Pianesi. 874-877 [doi]
- Minimizing Social Data Overload through Interest-Based Stream Filtering in a P2P Social NetworkSayooran Nagulendra, Julita Vassileva. 878-881 [doi]
- Social Network Based Recommendation Systems: A Short SurveySong Chen, Samuel Owusu, Lina Zhou. 882-885 [doi]
- Social Networks' Facebook' Statutes Updates Mining for Sentiment ClassificationJalel Akaichi. 886-891 [doi]
- A Pilot Study about Military Users and Information Systems: Exploring Military User Attitudes about TechnologyHarry D. Tunnell IV. 892-895 [doi]
- Self-Adaptive Optimized Link Prediction Based on Weak Ties Theory in Unweighted NetworkXuzhen Zhu, Hui Tian, Zheng Hu, Haifeng Liu. 896-900 [doi]
- A Novel Group Recommendation Algorithm with Collaborative FilteringYang Song, Zheng Hu, Haifeng Liu, Yu Shi, Hui Tian. 901-904 [doi]
- Analysis of Influential Features for Information DiffusionShohei Usui, Fujio Toriumi, Takatsugu Hirayama, Kenji Mase. 905-908 [doi]
- Privacy and Social Networks: Is Concern a Valid Indicator of Intention and Behaviour?Thomas Hughes-Roberts. 909-912 [doi]
- Study of Stock Prediction Based on Social NetworkZheng Chen, Xiaoqing Du. 913-916 [doi]
- Inkling: An Executable Paper System for Reviewing Scientific ApplicationsDennis G. Castleberry, Steven R. Brandt, Frank Löffler. 917-922 [doi]
- The Use of Social Context to Enhance Mobile Web Search ExperienceNour Salama, Sherif G. Aly, Ahmed Rafea. 923-927 [doi]
- Effective Clusterization of Political Tweets Using Kurtosis and Community DurationHiroshi Itsuki, Hitoshi Matsubara, Kazuki Arita, Kazunari Omi. 928-931 [doi]
- Analyzing Close Friend Interactions in Social MediaMorgan Madeira, Anupam Joshi. 932-935 [doi]
- Efficiency and Trade Network Analysis of the Electricity Market: 1985-2005Bernardo Creamer, Germán Creamer. 936-939 [doi]
- Fast Information Retrieval and Social Network Mining via Cosine Similarity Upper BoundWeizhong Zhao, Venkata Swamy Martha, Gang Chen, Xiaowei Xu. 940-943 [doi]
- Synthesizing Social Media Data Using Information MorphingKirk Ogaard. 944-949 [doi]
- Stock Market Manipulation Using Cyberattacks Together with Misinformation Disseminated through Social MediaMatti Mantere. 950-954 [doi]
- The Privacy Problem in Big Bata Applications: An Empirical Study on FacebookJerzy Surma. 955-958 [doi]
- Human Activity Recognition Based on 3D Mesh MoSIFT Feature DescriptorYue Ming. 959-962 [doi]
- Social Media Data Analytics Applied to Hurricane SandyHan Dong, Milton Halem, Shujia Zhou. 963-966 [doi]
- Social Welfare and Inequality in a Networked Resource Game with Human PlayersBowen Ni, Yu-Han Chang, Rajiv T. Maheswaran. 967-970 [doi]
- Viral Opinion Spreading Model in Social NetworksIgor Kanovsky, Omer Yaary. 971-974 [doi]
- Automatic Crowdsourcing-Based Classification of Marketing Messaging on TwitterRadu Machedon, William Rand, Yogesh Joshi. 975-978 [doi]
- Personalized Microblogs Corpus Recommendation Based on Dynamic Users InterestsShaymaa Khater, Hicham G. Elmongui, Denis Gracanin. 979-982 [doi]
- Tournament-Based Reputation Models for Aggregating Relative PreferencesSuratna Budalakoti, K. Suzanne Barber. 983-986 [doi]
- A Tweet of the Mind: Automated Emotion Detection for Social Media Using Brain Wave Pattern AnalysisAbdulaziz Almehmadi, Michael Bourque, Khalil El-Khatib. 987-991 [doi]
- An Integrative Approach for Measuring Privacy Impact of Identifiers in the Automotive DomainNaim Asaj, Albert Held, Michael Weber 0001. 992-998 [doi]
- TrustEd: A Dual-Database Trusted Broker for Multi-agency DataNeal Gibson, Greg Holland. 999-1004 [doi]
- GSM OTA SIM Cloning Attack and Cloning Resistance in EAP-SIM and USIMJaspreet Singh, Ron Ruhl, Dale Lindskog. 1005-1010 [doi]
- A K-Anonymity Method Based on SEM (Search Engine Marketing) Price of Personal InformationHidenobu Oguri, Noboru Sonehara. 1011-1015 [doi]
- A Notary Extension for the Online Certificate Status ProtocolChikaodili Ekechukwu, Dale Lindskog, Ron Ruhl. 1016-1021 [doi]
- Developing IHE-Based PHR Cloud SystemsCheng-Yi Yang, Chien-Tsai Liu. 1022-1025 [doi]
- Big Data and Policy Design for Data Sovereignty: A Case Study on Copyright and CCL in South KoreaHyejung Moon, Hyun-Suk Cho. 1026-1029 [doi]
- Models for Measuring Access Security of Web Application: Security Reference ModelAna Cervigni Guerra, Marcelo Schneck de Paula Pessôa. 1030-1033 [doi]
- A Predicting Model of TV Audience Rating Based on the FacebookYu-Hsuan Cheng, Chen Ming Wu, Tsun Ku, Gwo-Dong Chen. 1034-1037 [doi]
- Intelligent Systems to Autonomously Classify Several Arrhythmia Using Information from ECGOlga Valenzuela, Fernando J. Rojas, Luis Javier Herrera, Francisco M. Ortuño Guzman, Oresti Baños, G. Ruiz, H. Tribak, Héctor Pomares, Ignacio Rojas Ruiz. 1038-1045 [doi]
- Determining Appropriate Staffing Adjustments in a Call Center Staff GroupCurtis M. Passmore, Justin Zhan. 1046-1053 [doi]
- Robust, Scalable Anomaly Detection for Large Collections of ImagesMichael S. Kim. 1054-1058 [doi]
- Intelligent Research Performance Appraisal Model Based on Internal/Environmental Evaluation FeaturesDonald J. Kim, Myunggwon Hwang, Jangwon Gim, Sa-Kwang Song, Do-Heon Jeong, Seungwoo Lee, Hanmin Jung. 1059-1065 [doi]
- Next Big Thing in Big Data: The Security of the ICT Supply ChainTianbo Lu, Xiaobo Guo, Bing Xu, Lingling Zhao, Yong Peng, Hongyu Yang. 1066-1073 [doi]
- Real-Time Data Streaming Architecture and Intelligent Workflow Management for Processing Massive Ecological VideosGayathri Nadarajan, Cheng-Lin Yang, Yun-Heh Chen-Burger, Yu-Jung Cheng, Sun-In Lin, Fang-Pang Lin. 1074-1080 [doi]
- Creating Semantic Data from Relational DatabaseChang-Hoo Jeong, Sung-Pil Choi, Sungho Shin, Seungwoo Lee, Hanmin Jung, Soon Young Kim, Pyung Kim. 1081-1086 [doi]