The Community for Technology Leaders
2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (2014)
China
Aug. 17, 2014 to Aug. 20, 2014
ISBN: 978-1-4799-5877-1
TABLE OF CONTENTS

[Front cover] (PDF)

pp. c1

[Title page] (PDF)

pp. 1

Table of contents (PDF)

pp. i-xi

ASONAM 2014 message from steering chair (PDF)

Reda Alhajj , University of Calgary, Canada
pp. xii

Message from IEEE/ACM ASONAM 2014 general chairs (PDF)

Jon Rokne , University of Calgary, Alberta, Canada
Yan Jia , University of Defence Technology, Beijing, China
pp. xiii

Welcome from the ASONAM 2014 program chairs (PDF)

Xindong Wu , University of Vermont, USA
Martin Ester , Simon Fraser University, Canada
Guandong Xu , University of Technology Sydney, Australia
pp. xiv

Message from FOSINT-SI 2014 chairs (PDF)

Zeki Erdem , TUBITAK BILGEM, Turkey
Uwe Glasser , Simon Fraser University, Canada
Lisa Kaati , Swedish Defence Research Agency & Uppsala University Sweden
Daniel Zeng , University of Arizona, USA
pp. xxx

Message from HIBIBI 2014 chairs (PDF)

Gada Naji , Lebanese University, Lebanon
Jaia Zeng , The University of Texas MD Anderson Cancer Center, USA
Mehmet Kaya , Firat University, Turkey
Shang Gao , University of Calgary, Canada
pp. xxxi

Message from URUGC 2014 program chairs (PDF)

Jonathan Zhu , City University of Hong Kong, China
Qiang Ye , Harbin Institute of Technology, China
Jiayin Qi , Beijing University of Posts and Telecommunications, China
pp. xxxii

Message from C3-2014 chairs (PDF)

Gang Li , School of Information Technology, Deakin University, Australia
Wenjia Niu , Chinese Academy of Sciences, China
Li Guo , Chinese Academy of Sciences, China
Lynn Batten , School of Information Technology, Deakin University, Australia
pp. xxxiii

Message from SNAA 2014 program chairs (PDF)

Piotr Brodka , Institute of Informatics, Wroclaw University of Technology, Poland
Matteo Magnani , Department of Information Technology, Division of Computing Science, Uppsala University, Sweden
Katarzyna Musial , School of Natural and Mathematical Sciences, Department of Informatics, King's College London, United Kingdom
pp. xxxiv

ASONAM 2014 keynotes (PDF)

pp. xxxv-xxxvii

ASONAM 2014 panel: Influence in social networking and the effective of its analysis and mining in the era of electronic communication (PDF)

Garry Robins , University of Melbourne, Australia
Liabin Zhao , CISCO Inc, USA
Przemyslaw Kazienko , Wrodaw University of Technology, Poland
Xindong Wu , University of Vermont, VT, USA
pp. xxxviii

Author index (PDF)

pp. 968-973

A local seed selection algorithm for overlapping community detection (Abstract)

Farnaz Moradi , Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg, Sweden
Tomas Olovsson , Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg, Sweden
Philippas Tsigas , Department of Computer Science and Engineering, Chalmers University of Technology, Gothenburg, Sweden
pp. 1-8

Community evolution prediction in dynamic social networks (Abstract)

Mansoureh Takaffoli , Department of Computing Science, University of Alberta, Edmonton, Canada T6G 2E8
Reihaneh Rabbany , Department of Computing Science, University of Alberta, Edmonton, Canada T6G 2E8
Osmar R. Zaiane , Department of Computing Science, University of Alberta, Edmonton, Canada T6G 2E8
pp. 9-16

Overlapping Stochastic Community Finding (Abstract)

Aaron McDaid , Insight Centre for Data Analytics, School of Computer Science and Informatics, University College Dublin, Ireland
Neil Hurley , Insight Centre for Data Analytics, School of Computer Science and Informatics, University College Dublin, Ireland
Brendan Murphy , Insight Centre for Data Analytics, School of Mathematical Sciences, University College Dublin, Ireland
pp. 17-20

rLinkTopic: A probabilistic model for discovering regional LinkTopic communities (Abstract)

Tran Van Canh , Institute of Computer Science, Heidelberg University, Germany
Michael Gertz , Institute of Computer Science, Heidelberg University, Germany
pp. 21-26

A uniform framework for community detection via influence maximization in social networks (Abstract)

Fei Jiang , School of Electronics Engineering and Computer Science, Peking University, Beijing, 100871, China
Shuyuan Jin , School of Electronics Engineering and Computer Science, Peking University, Beijing, 100871, China
Yanlei Wu , School of Electronics Engineering and Computer Science, Peking University, Beijing, 100871, China
Jin Xu , School of Electronics Engineering and Computer Science, Peking University, Beijing, 100871, China
pp. 27-32

Gossip-based partitioning and replication for Online Social Networks (Abstract)

Muhammad Anis Uddin Nasir , KTH, Royal Institute of Technology, Sweden
Fatemeh Rahimian , Swedish Institute of Computer Science (SICS), Sweden
Sarunas Girdzijauskas , KTH, Royal Institute of Technology, Sweden
pp. 33-42

Online evaluation re-scoring based on review behavior analysis (Abstract)

Rong Zhang , East China Normal University, Shang Hai, China
Xiaofeng He , East China Normal University, Shang Hai, China
Aoying Zhou , East China Normal University, Shang Hai, China
Chaofeng Sha , Fudan University, Shang Hai, China
pp. 43-50

Understanding lurking behaviors in social networks across time (Abstract)

Andrea Tagarelli , DIMES, University of Calabria, 87036 Arcavacata di Rende (CS) - Italy
Roberto Interdonato , DIMES, University of Calabria, 87036 Arcavacata di Rende (CS) - Italy
pp. 51-55

Start-up firms' networks for innovation: Embedded in entrepreneurs' networks in private and public spheres (Abstract)

Kent Wickstrom Jensen , Department of Entrepreneurship and Relationship Management, University of Southern Denmark, Denmark
Thomas Schott , Department of Entrepreneurship and Relationship Management, University of Southern Denmark, Denmark
pp. 56-61

A new space for comparing graphs (Abstract)

Anshumali Shrivastava , Department of Computer Science, Computing and Information Science, Cornell University, Ithaca, NY 14853, USA
Ping Li , Department of Statistics and Biostatistics, Department of Computer Science, Rutgers University, Piscataway, NJ 08854, USA
pp. 62-71

A model of consistent node types in signed directed social networks (Abstract)

Dongjin Song , Department of Electrical and Computer Engineering, University of California, San Diego, La Jolla, USA, 92093-0409
David A. Meyer , Department of Mathematics, University of California, San Diego, La Jolla, USA, 92093-0112
pp. 72-80

Name disambiguation from link data in a collaboration graph (Abstract)

Baichuan Zhang , Dept. of Computer and Info. Science, Indiana University - Purdue University Indianapolis, USA
Tanay Kumar Saha , Dept. of Computer and Info. Science, Indiana University - Purdue University Indianapolis, USA
Mohammad Al Hasan , Dept. of Computer and Info. Science, Indiana University - Purdue University Indianapolis, USA
pp. 81-84

A backbone extraction method with Local Search for complex weighted networks (Abstract)

Zhan Bu , Jiangsu Provincial Key Lab. of E-Business, Nanjing University of Finance and Economics, China
Zhiang Wu , Jiangsu Provincial Key Lab. of E-Business, Nanjing University of Finance and Economics, China
Liqiang Qian , School of Computer Science and Technology, Soochow University, Suzhou, China
Jie Cao , Jiangsu Provincial Key Lab. of E-Business, Nanjing University of Finance and Economics, China
Guandong Xu , Advanced Analytics Institute, University of Technology, Sydney, Australia
pp. 85-88

Efficient algorithm for ranking of nodes' importance in information dissemination (Abstract)

Zhuo Qi Lee , School of Computer Engineering, Nanyang Technological University, Singapore
Wen-Jing Hsu , School of Computer Engineering, Nanyang Technological University, Singapore
Miao Lin , Institute for Infocomm Research, A*STAR, Singapore
pp. 89-92

Community detection in dynamic social networks: A game-theoretic approach (Abstract)

Hamidreza Alvari , Department of EECS, University of Central Florida, USA
Alireza Hajibagheri , Department of EECS, University of Central Florida, USA
Gita Sukthankar , Department of EECS, University of Central Florida, USA
pp. 101-107

Using triads to identify local community structure in social networks (Abstract)

Justin Fagnan , University of Alberta, Canada
Osmar Zaiane , University of Alberta, Canada
Denilson Barbosa , University of Alberta, Canada
pp. 108-112

An modularity-based overlapping community structure detecting algorithm (Abstract)

Kui Meng , School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, China
Gongshen Liu , School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, China
Qiong Hu , School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, China
Jianhua Li , School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, China
pp. 113-117

Overlapping community detection in large networks from a data fusion view (Abstract)

Le Yu , School of Computer Science, Beijing University of Posts and Telecommunications, China
Bin Wu , School of Computer Science, BUPT, Beijing, China
Shuai Zhao , State Key Laboratory of Networking and Switching Technology, BUPT, Beijing, China
Bai Wang , School of Computer Science, BUPT, Beijing, China
pp. 118-121

The network you keep: Analyzing persons of interest using cliqster (Abstract)

Saber Shokat Fadaee , College of Computer and Information Science, Northeastern University, USA
Mehrdad Farajtabar , College of Computing, Georgia Institute of Technology, USA
Ravi Sundaram , College of Computer and Information Science, Northeastern University, USA
Javed A. Aslam , College of Computer and Information Science, Northeastern University, USA
Nikos Passas , School of Criminology and Criminal Justice, Northeastern University, USA
pp. 122-129

Automatic classification of scientific groups as productive: An approach based on motif analysis (Abstract)

Tanmoy Chakraborty , Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India - 721302
Niloy Ganguly , Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India - 721302
Animesh Mukherjee , Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India - 721302
pp. 130-137

Behavioral detection of spam URL sharing: Posting patterns versus click patterns (Abstract)

Cheng Cao , Department of Computer Science and Engineering, Texas A&M University, USA
James Caverlee , Department of Computer Science and Engineering, Texas A&M University, USA
pp. 138-141

Interactions around social networks matter: Predicting the social network from associated interaction networks (Abstract)

Mohammed Abufouda , University of Kaiserslautern, Gottlieb-Daimler-Str. 48/672, 67663, Germany
Katharina Anna Zweig , University of Kaiserslautern, Gottlieb-Daimler-Str. 48/672, 67663, Germany
pp. 142-145

Constructing social networks from semi-structured chat-log data (Abstract)

Sude Tavassoli , Graph Theory and Complex Network Analysis, Department of Computer Science, TU Kaiserslautern, Germany
Markus Moessner , Center for Psychotherapy Research, University Hospital, Heidelberg, Germany
Katharina Anna Zweig , Graph Theory and Complex Network Analysis, Department of Computer Science, TU Kaiserslautern, Germany
pp. 146-149

Detecting malicious clients in ISP networks using HTTP connectivity graph and flow information (Abstract)

Lei Liu , Dept. of Computer Science, Michigan State University, East Lansing, 48824, USA
Sabyasachi Saha , Narus Inc. 570 Maude Court, Sunnyvale, CA 94085, USA
Ruben Torres , Narus Inc. 570 Maude Court, Sunnyvale, CA 94085, USA
Jianpeng Xu , Dept. of Computer Science, Michigan State University, East Lansing, 48824, USA
Pang-Ning Tan , Dept. of Computer Science, Michigan State University, East Lansing, 48824, USA
Antonio Nucci , Narus Inc. 570 Maude Court, Sunnyvale, CA 94085, USA
Marco Mellia , Politecnico di Torino, Italy
pp. 150-157

Triggering patterns of topology changes in dynamic graphs (Abstract)

Mehdi Kaytoue , INSA-Lyon, CNRS, LIRIS UMR5205, F-69621, France
Yoann Pitarch , Université de Toulouse, CNRS, IRIT UMR5505, F-31071, France
Marc Plantevit , Université Claude Bernard Lyon 1, CNRS, LIRIS UMR5205, F-69621, France
Celine Robardet , INSA-Lyon, CNRS, LIRIS UMR5205, F-69621, France
pp. 158-165

Indexing bipartite memberships in web graphs (Abstract)

Yusheng Xie , Northwestern University, Evanston, IL USA
Zhengzhang Chen , NEC Laboratories America, Princeton, NJ USA
Diana Palsetia , Northwestern University, Evanston, IL USA
Ankit Agrawal , Northwestern University, Evanston, IL USA
Alok Choudhary , Northwestern University, Evanston, IL USA
pp. 166-173

Two phase transitions in the adaptive voter model based on the homophily principle (Abstract)

Takashi Ishikawa , Dept. of Computer and Information Eng., Nippon Institute of Technology, Miyashiro, Saitama, 345-8501 Japan
pp. 174-179

Extremal optimization-based semi-supervised algorithm with conflict pairwise constraints for community detection (Abstract)

Lei Li , School of Computer Science and Information Engineering, Hefei University of Technology, Anhui, 230009, China
Mei Du , School of Computer Science and Information Engineering, Hefei University of Technology, Anhui, 230009, China
Guanfeng Liu , Soochow Advanced Data Analytics Lab, Soochow University, Suzhou, Jiangsu, 215006, China
Xuegang Hu , School of Computer Science and Information Engineering, Hefei University of Technology, Anhui, 230009, China
Gongqing Wu , School of Computer Science and Information Engineering, Hefei University of Technology, Anhui, 230009, China
pp. 180-187

Accurately detecting trolls in Slashdot Zoo via decluttering (Abstract)

Srijan Kumar , Dept. of Computer Science& UMIACS, University of Maryland, College Park, 20742, USA
Francesca Spezzano , Dept. of Computer Science& UMIACS, University of Maryland, College Park, 20742, USA
V.S. Subrahmanian , Dept. of Computer Science& UMIACS, University of Maryland, College Park, 20742, USA
pp. 188-195

Detecting highly overlapping community structure based on Maximal Clique Networks (Abstract)

Peng Wu , School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, China 200240
Li Pan , School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, China 200240
pp. 196-199

An ant colony optimization method to detect communities in social networks (Abstract)

Saeed H.S. Javadi , Department of Computer Science, Amirkabir University of Technology, Tehran, Iran
Shahram Khadivi , Department of Computer Engineering, Amirkabir University of Technology, Tehran, Iran
M. Ebrahim Shiri , Department of Computer Science, Amirkabir University of Technology, Tehran, Iran
Jia Xu , Center for Machine Intelligence, Tsinghua University, Beijing, China
pp. 200-203

Scanning network communities with power-law-distributed attributes (Abstract)

Tai-Chi Wang , Institute of Statistical Science, Academia Sinica, Taipei, Taiwan
Frederick Kin Hing Phoa , Institute of Statistical Science, Academia Sinica, Taipei, Taiwan
pp. 204-207

Do neighbor buddies make a difference in reblog likelihood? An analysis on SINA Weibo data (Abstract)

Lumin Zhang , School of Computer Science, National University of Defense Technology, China
Jian Pei , School of Computing Science, Simon Fraser University, Burnaby, BC, Canada
Yan Jia , School of Computer Science, National University of Defense Technology, China
Bin Zhou , School of Computer Science, National University of Defense Technology, China
Xiang Wang , School of Computer Science, National University of Defense Technology, China
pp. 208-215

“Can you really trust that seed?”: Reducing the impact of seed noise in personalized PageRank (Abstract)

Shengyu Huang , Arizona State University, Tempe, 85287, USA
Xinsheng Li , Arizona State University, Tempe, 85287, USA
K. Selcuk Candan , Arizona State University, Tempe, 85287, USA
Maria Luisa Sapino , University of Torino, I-10149, Italy
pp. 216-223

Discovering trust patterns in ego networks (Abstract)

Cuneyt Gurcan Akcora , DiSTA, Università degli Studi dell'Insubria, Via Mazzini 5, Varese, Italy
Elena Ferrari , DiSTA, Università degli Studi dell'Insubria, Via Mazzini 5, Varese, Italy
pp. 224-229

Topic dynamics in Weibo: Happy Entertainment dominates but angry Finance is more periodic (Abstract)

Rui Fan , State Key Laboratory of Software Development Environment, Beihang University, Beijing, 100191, China
Jichang Zhao , School of Economics and Management, Beihang University, Beijing, 100191, China
Xu Feng , State Key Laboratory of Software Development Environment, Beihang University, Beijing, 100191, China
Ke Xu , State Key Laboratory of Software Development Environment, Beihang University, Beijing, 100191, China
pp. 230-233

Time-aware reciprocity prediction in trust network (Abstract)

Xu Feng , State Key Laboratory of Software Development Environment, Beihang University, Beijing, 100191, China
Jichang Zhao , School of Economics and Management, Beihang University, Beijing, 100191, China
Zhiwen Fang , State Key Laboratory of Software Development Environment, Beihang University, Beijing, 100191, China
Ke Xu , State Key Laboratory of Software Development Environment, Beihang University, Beijing, 100191, China
pp. 234-237

A fuzzy clustering algorithm to detect criminals without prior information (Abstract)

Changjun Fan , Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China
Kaiming Xiao , Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China
Baoxin Xiu , Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China
Guodong Lv , Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China
pp. 238-243

Measuring UK crime gangs (Abstract)

Giles Oatley , Department of Computing, Cardiff Metropolitan University, UK
Tom Crick , Department of Computing, Cardiff Metropolitan University, UK
pp. 253-256

MOSAIC: Criminal network analysis for multi-modal surveillance and decision support (Abstract)

Patrick Seidler , A E Solutions (BI) Ltd., Badsey, United Kingdom
Richard Adderley , A E Solutions (BI) Ltd., Badsey, United Kingdom
Atta Badii , University of Reading, Reading, United Kingdom
Matteo Raffaelli , Synthema srl, Pisa, Italy
pp. 257-260

Towards online anti-opinion spam: Spotting fake reviews from the review sequence (Abstract)

Yuming Lin , Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, China
Tao Zhu , Institute for Data Science and Engineering, East China Normal University, Shanghai, China
Hao Wu , Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, China
Jingwei Zhang , Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, China
Xiaoling Wang , Institute for Data Science and Engineering, East China Normal University, Shanghai, China
Aoying Zhou , Institute for Data Science and Engineering, East China Normal University, Shanghai, China
pp. 261-264

Exploiting rank-learning models to predict the diffusion of preferences on social networks (Abstract)

Chin-Hua Tsai , National Taiwan University, Taiwan
Jing-Kai Lou , National Taiwan University, Taiwan
Wan-Chen Lu , Chunghwa Telecom, Taiwan
Shou-De Lin , National Taiwan University, Taiwan
pp. 265-272

Learning the information diffusion probabilities by using variance regularized EM algorithm (Abstract)

Haiguang Li , University of Vermont, Burlington, VT 05405, USA
Tianyu Cao , University of Vermont, Burlington, VT 05405, USA
Zhao Li , Taobao, Alibaba Group, Hangzhou, China 310000
pp. 273-280

Cluster cascades: Infer multiple underlying networks using diffusion data (Abstract)

Ming-Hao Yang , Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan
Chung-Kuang Chou , Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan
Ming-Syan Chen , Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan
pp. 281-284

On macro and micro exploration of hashtag diffusion in Twitter (Abstract)

Yazhe Wang , School of Information Systems, Singapore Management University, Singapore
Baihua Zheng , School of Information Systems, Singapore Management University, Singapore
pp. 285-288

SSRM: Structural social role mining for dynamic social networks (Abstract)

Afra Abnar , Department of Computing Science, University of Alberta, Edmonton, Canada T6G 2E8
Mansoureh Takaffoli , Department of Computing Science, University of Alberta, Edmonton, Canada T6G 2E8
Reihaneh Rabbany , Department of Computing Science, University of Alberta, Edmonton, Canada T6G 2E8
Osmar R. Zaiane , Department of Computing Science, University of Alberta, Edmonton, Canada T6G 2E8
pp. 289-296

Bio-inspired models for characterizing YouTube viewcout (Abstract)

Cedric Richier , University of Avignon, 84000, FRANCE
Eitan Altman , INRIA, B.P 93, 06902 Sophia Antipollis Cedex, FRANCE
Rachid Elazouzi , University of Avignon, 84000, FRANCE
Tania Jimenez , University of Avignon, 84000, FRANCE
Georges Linares , University of Avignon, 84000, FRANCE
Yonathan Portilla , University of Avignon, 84000, FRANCE
pp. 297-305

Social networks analysis and perception of social support of young mothers in the process of reconstruction: The social fabric of winter victims in the Colombian Caribbean (South America) (Abstract)

Carolina S. Castro , Universidad Del Norte, Centro de Investigaciones en Desarrollo Humano Km 5, Via Puerto Colombia, Colombia
Camilo A. Madariaga , Department of Psychology, Colombia
pp. 306-309

A semantic model for academic social network analysis (Abstract)

Jie Hu , School of Computer Science and Information Engineering, Hubei University, Wuhan, China
Mengchi Liu , School of Computer Science, Carleton University, Ottawa, Canada
Junchi Zhang , School of Computer Science and Information Engineering, Hubei University, Wuhan, China
pp. 310-313

Are communities as strong as we think? (Abstract)

Md Abdul Alim , Department of Computer and Information Science and Engineering, University of Florida, Gainesville, 32611, USA
Alan Kuhnle , Department of Computer and Information Science and Engineering, University of Florida, Gainesville, 32611, USA
My T. Thai , Department of Computer and Information Science and Engineering, University of Florida, Gainesville, 32611, USA
pp. 314-319

Exploring user expertise and descriptive ability in community question answering (Abstract)

Baoguo Yang , Department of Computer Science, University of York, UK
Suresh Manandhar , Department of Computer Science, University of York, UK
pp. 320-327

Min(e)d your tags: Analysis of Question response time in StackOverflow (Abstract)

Vasudev Bhat , Department of Computer Science, Stony Brook University, USA
Adheesh Gokhale , Department of Computer Science, Stony Brook University, USA
Ravi Jadhav , Department of Computer Science, Stony Brook University, USA
Jagat Pudipeddi , Department of Computer Science, Stony Brook University, USA
Leman Akoglu , Department of Computer Science, Stony Brook University, USA
pp. 328-335

Question difficulty evaluation by knowledge gap analysis in Question Answer communities (Abstract)

Chih-Lu Lin , Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan, R.O.C.
Ying-Liang Chen , Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan, R.O.C.
Hung-Yu Kao , Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan, R.O.C.
pp. 336-339

Joint voting prediction for questions and answers in CQA (Abstract)

Yuan Yao , State Key Laboratory for Novel Software Technology, Nanjing University, China
Hanghang Tong , City College, CUNY, USA
Tao Xie , University of Illinois at Urbana-Champaign, USA
Leman Akoglu , Stony Brook University, USA
Feng Xu , State Key Laboratory for Novel Software Technology, Nanjing University, China
Jian Lu , State Key Laboratory for Novel Software Technology, Nanjing University, China
pp. 340-343

Empirical study on overlapping community detection in question and answer sites (Abstract)

Zide Meng , INRIA Sophia Antipolis Méditerranée, 06900, France
Fabien Gandon , INRIA Sophia Antipolis Méditerranée, 06900, France
Catherine Faron Zucker , Univ. Nice Sophia Antipolis, CNRS, I3S, UMR 7271, 06900, France
Ge Song , INRIA Sophia Antipolis Méditerranée, 06900, France
pp. 344-348

Data-mining twitter and the autism spectrum disorder: A Pilot study (Abstract)

Adham Beykikhoshk , Centre for Pattern Recognition and Data Analytics, Deakin Univeristy, Australia
Ognjen Arandjelovic , Centre for Pattern Recognition and Data Analytics, Deakin Univeristy, Australia
Dinh Phung , Centre for Pattern Recognition and Data Analytics, Deakin Univeristy, Australia
Svetha Venkatesh , Centre for Pattern Recognition and Data Analytics, Deakin Univeristy, Australia
Terry Caelli , National ICT Australia (NICTA), Melbourne, Australia
pp. 349-356

An analysis of positivity and negativity attributes of users in twitter (Abstract)

Mahnaz Roshanaei , Department of Computer Science, University of Colorado, Boulder, USA
Shivakant Mishra , Department of Computer Science, University of Colorado, Boulder, USA
pp. 365-370

Identifying the community roles of social capitalists in the Twitter network (Abstract)

Vincent Labatut , Galatasaray University, Computer Science Department, Çırağan cad. n36, Ortaköy 34357, İstanbul, Turquie
Nicolas Dugue , Univ. Orléans, INSA Centre Val de Loire, LIFO EA 4022 45067, France
Anthony Perez , Univ. Orléans, INSA Centre Val de Loire, LIFO EA 4022 45067, France
pp. 371-374

Mention-anomaly-based Event Detection and tracking in Twitter (Abstract)

Adrien Guille , ERIC Lab, University of Lyon 2, France
Cecile Favre , ERIC Lab, University of Lyon 2, France
pp. 375-382

Detecting deception in Online Social Networks (Abstract)

Jalal S. Alowibdi , Department of Computer Science, University of Illinois at Chicago, USA
Ugo A. Buy , Department of Computer Science, University of Illinois at Chicago, USA
Philip S. Yu , Department of Computer Science, University of Illinois at Chicago, USA
Leon Stenneth , Nokia Connected Driving, Chicago, Illinois, USA
pp. 383-390

#tag: Meme or event? (Abstract)

Dimitrios Kotsakos , University of Athens, Greece
Panos Sakkos , University of Athens, Greece
Ioannis Katakis , University of Athens, Greece
Dimitrios Gunopulos , University of Athens, Greece
pp. 391-394

Identifying relevant event content for real-time event detection (Abstract)

Xinyue Wang , School of Electronic Engineering and Computer Science, Queen Mary, University of London, UK
Laurissa Tokarchuk , School of Electronic Engineering and Computer Science, Queen Mary, University of London, UK
Stefan Poslad , School of Electronic Engineering and Computer Science, Queen Mary, University of London, UK
pp. 395-398

Finding social interaction patterns using call and proximity logs simultaneously (Abstract)

Yong-Jin Han , School of Computer Science and Engineering, Kyungpook National University, Daegu 702-701, Korea
Shao Bo Cheng , School of Computer Science and Engineering, Kyungpook National University, Daegu 702-701, Korea
Se Young Park , School of Computer Science and Engineering, Kyungpook National University, Daegu 702-701, Korea
Seong-Bae Park , School of Computer Science and Engineering, Kyungpook National University, Daegu 702-701, Korea
pp. 399-402

Geographic focus detection using multiple location taggers (Abstract)

Philipp Berger , Hasso-Plattner-Institute, University of Potsdam, Germany
Patrick Hennig , Hasso-Plattner-Institute, University of Potsdam, Germany
Dustin Glaeser , Hasso-Plattner-Institute, University of Potsdam, Germany
Hauke Klement , Hasso-Plattner-Institute, University of Potsdam, Germany
Christoph Meinel , Hasso-Plattner-Institute, University of Potsdam, Germany
pp. 403-408

Online social media in the Syria conflict: Encompassing the extremes and the in-betweens (Abstract)

Derek O'Callaghan , School of Computer Science & Informatics, University College Dublin, Ireland
Nico Prucha , Department of Near Eastern Studies, University of Vienna, Austria
Derek Greene , School of Computer Science & Informatics, University College Dublin, Ireland
Maura Conway , School of Law & Government, Dublin City University, Ireland
Joe Carthy , School of Computer Science & Informatics, University College Dublin, Ireland
Padraig Cunningham , School of Computer Science & Informatics, University College Dublin, Ireland
pp. 409-416

Early detection of persistent topics in social networks (Abstract)

Shota Saito , Graduate School of Information Science and Technology, The University of Tokyo, Japan
Ryota Tomioka , Toyota Technological Institute at Chicago, Chicago, USA
Kenji Yamanishi , Graduate School of Information Science and Technology, The University of Tokyo, Japan
pp. 417-424

Clearing contamination in large networks (Abstract)

Michael Simpson , University of Victoria, Canada
Venkatesh Srinivasan , University of Victoria, Canada
Alex Thomo , University of Victoria, Canada
pp. 425-428

Influence inflation in online social networks (Abstract)

Jianjun Xie , Beijing University of Posts and Telecommunications, China, 100876
Chuang Zhang , Beijing University of Posts and Telecommunications, China, 100876
Ming Wu , Beijing University of Posts and Telecommunications, China, 100876
Yun Huang , Northwestern University, 2145 Sheridan Rd, TECH C210, Evanston, IL 60208, USA
pp. 435-442

Multi-objective optimization to identify key players in social networks (Abstract)

R. Chulaka Gunasekara , Department of Electrical Engineering and Computer Science, Syracuse University, NY 13244-4100, USA
Kishan Mehrotra , Department of Electrical Engineering and Computer Science, Syracuse University, NY 13244-4100, USA
Chilukuri K. Mohan , Department of Electrical Engineering and Computer Science, Syracuse University, NY 13244-4100, USA
pp. 443-450

Influence in social networks: A unified model? (Abstract)

Ajitesh Srivastava , Department of Computer Science, University of Southern California, Los Angeles, USA
Charalampos Chelmis , Ming Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, USA
Viktor K. Prasanna , Ming Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, USA
pp. 451-454

Diversified social influence maximization (Abstract)

Fangshuang Tang , School of Computer Science and Technology, University of Science and Technology of China, Hefei, China, 230027
Qi Liu , School of Computer Science and Technology, University of Science and Technology of China, Hefei, China, 230027
Hengshu Zhu , School of Computer Science and Technology, University of Science and Technology of China, Hefei, China, 230027
Enhong Chen , School of Computer Science and Technology, University of Science and Technology of China, Hefei, China, 230027
Feida Zhu , School of Information Systems, Singapore Management University, Singapore, 178902
pp. 455-459

A computational approach to measuring the correlation between expertise and social media influence for celebrities on microblogs (Abstract)

Wayne Xin Zhao , School of Information, Renmin University of China, Beijing, China
Jing Liu , Microsoft Research, Beijing, China
Yulan He , School of Engineering and Applied Science, Aston University, UK
Chin-Yew Lin , Microsoft Research, Beijing, China
Ji-Rong Wen , School of Information, Renmin University of China, Beijing, China
pp. 460-463

User characterization from geographic topic analysis in online social media (Abstract)

Jiangchuan Zheng , Dept. of Comp. Sci. and Engr., The Hong Kong Univ. of Sci. and Tech., China
Siyuan Liu , Heinz College, Carnegie Mellon University, USA
Lionel M. Ni , Dept. of Comp. Sci. and Engr., Guangzhou HKUST FYT Research Institute, The Hong Kong Univ. of Sci. and Tech., China
pp. 464-471

CRIMETRACER: Activity space based crime location prediction (Abstract)

Mohammad A. Tayebi , School of Computing Science, Simon Fraser University, B.C., Canada
Martin Ester , School of Computing Science, Simon Fraser University, B.C., Canada
Uwe Glasser , School of Computing Science, Simon Fraser University, B.C., Canada
Patricia L. Brantingham , School of Criminology, Simon Fraser University, B.C., Canada
pp. 472-480

A method for characterizing communities in dynamic attributed complex networks (Abstract)

Gunce Keziban Orman , INSA-Lyon, CNRS, LIRIS, Université de Lyon, UMR5205, F-69621, France
Vincent Labatut , Computer Engineering Department, Galatasaray University, Ortaköy 34349, Istanbul, Turkey
Marc Plantevit , Université Lyon 1, CNRS, LIRIS, Université de Lyon, UMR5205, F-69622, France
Jean-Francois Boulicaut , INSA-Lyon, CNRS, LIRIS, Université de Lyon, UMR5205, F-69621, France
pp. 481-484

Who were you talking to - Mining interpersonal relationships from cellphone network data (Abstract)

Mo Yu , College of Information Sciences and Technology, The Pennsylvania State University, USA
Wenjun Si , Key Laboratory of Machine Perception, Peking University, China
Guojie Song , Key Laboratory of Machine Perception, Peking University, China
Zhenhui Li , College of Information Sciences and Technology, The Pennsylvania State University, USA
John Yen , College of Information Sciences and Technology, The Pennsylvania State University, USA
pp. 485-490

Alike people, alike interests? A large-scale study on interest similarity in social networks (Abstract)

Xiao Han , Institut-Mines Télécom, Télécom SudParis, France
Leye Wang , Institut-Mines Télécom, Télécom SudParis, France
Soochang Park , Institut-Mines Télécom, Télécom SudParis, France
Angel Cuevas , Universidad Carlos III de Madrid, Spain
Noel Crespi , Institut-Mines Télécom, Télécom SudParis, France
pp. 491-496

Agent-based simulation research on group emotion evolution of public emergency (Abstract)

Bo Li , College of Information System and Management, National University of Defense Technology, Changsha, China
Duoyong Sun , College of Information System and Management, National University of Defense Technology, Changsha, China
Zihan Lin , College of Information System and Management, National University of Defense Technology, Changsha, China
Chaomin Ou , College of Information System and Management, National University of Defense Technology, Changsha, China
pp. 497-502

Accelerate the detection of trends by using sentiment analysis within the blogosphere (Abstract)

Patrick Hennig , Hasso-Plattner-Institute, University of Potsdam, Germany
Philipp Berger , Hasso-Plattner-Institute, University of Potsdam, Germany
Claudia Lehmann , Hasso-Plattner-Institute, University of Potsdam, Germany
Andrina Mascher , Hasso-Plattner-Institute, University of Potsdam, Germany
Christoph Meinel , Hasso-Plattner-Institute, University of Potsdam, Germany
pp. 503-508

Multi-label collective classification in multi-attribute multi-relational network data (Abstract)

Priyesh Vijayan , Ericsson Research, Chennai, India
Shivashankar Subramanian , Ericsson Research, Chennai, India
Balaraman Ravindran , Department of CSE, IIT Madras, Chennai, India
pp. 509-514

Penalized partial least squares for multi-label data (Abstract)

Huawen Liu , Department of Computer Science, Zhejiang Normal University, Jinhua 321004, China
Zongjie Ma , Department of Computer Science, Zhejiang Normal University, Jinhua 321004, China
Jianmin Zhao , Department of Computer Science, Zhejiang Normal University, Jinhua 321004, China
Zhonglong Zheng , Department of Computer Science, Zhejiang Normal University, Jinhua 321004, China
pp. 515-520

A unified modularity by encoding the similarity attraction feature into the null model (Abstract)

Xin Liu , Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro, 152-8552 Japan
Tsuyoshi Murata , Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro, 152-8552 Japan
Ken Wakita , Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro, 152-8552 Japan
pp. 521-528

A multi-generational social learning model: The effect of information cascade on aggregate welfare (Abstract)

Marziyeh Barghandan , Department of Computer Engineering, Faculty of Engineering, Persian Gulf University, Bushehr 75169, Iran
Mohammad Malekzadeh , Department of Computer Engineering, Faculty of Engineering, Persian Gulf University, Bushehr 75169, Iran
Atefeh Safdel , Department of Computer Engineering, Faculty of Engineering, Persian Gulf University, Bushehr 75169, Iran
Iren Mazloomzadeh , Department of Computer Engineering, Faculty of Engineering, Persian Gulf University, Bushehr 75169, Iran
pp. 529-533

Inferring air pollution by sniffing social media (Abstract)

Shike Mei , Department of Computer Sciences, University of Wisconsin-Madison, USA 53706
Han Li , Department of Computer Sciences, University of Wisconsin-Madison, USA 53706
Jing Fan , Department of Computer Sciences, University of Wisconsin-Madison, USA 53706
Xiaojin Zhu , Department of Computer Sciences, University of Wisconsin-Madison, USA 53706
Charles R. Dyer , Department of Computer Sciences, University of Wisconsin-Madison, USA 53706
pp. 534-539

ETAF: An extended trust antecedents framework for trust prediction (Abstract)

Guibing Guo , School of Computer Engineering, Nanyang Technological University, Singapore
Jie Zhang , School of Computer Engineering, Nanyang Technological University, Singapore
Daniel Thalmann , School of Computer Engineering, Nanyang Technological University, Singapore
Neil Yorke-Smith , American University of Beirut, Lebanon
pp. 540-547

Persuasion driven influence propagation in social networks (Abstract)

Terrence Leung , Department of Computing, Hong Kong Polytechnic University, Hunghom, Kowloon, Hong Kong
Fu-lai Chung , Department of Computing, Hong Kong Polytechnic University, Hunghom, Kowloon, Hong Kong
pp. 548-554

A novel algorithm for community detection and influence ranking in social networks (Abstract)

Wenjun Wang , Department of Management Sciences, University of Iowa, 52242, USA
W. Nick Street , Department of Management Sciences, University of Iowa, 52242, USA
pp. 555-560

Leadership: Do networks matter? (Abstract)

Yulia Tyshchuk , Department of Industrial and Systems Engineering, Rensselaer Polytechnic Institute, Troy, NY, USA
William Wallace , Department of Industrial and Systems Engineering, Rensselaer Polytechnic Institute, Troy, NY, USA
Kathryn Coronges , Department of Behavioral Sciences and Leadership, United States Military Academy, West Point, NY, USA
pp. 561-565

Recommendation in Academia: A joint multi-relational model (Abstract)

Zaihan Yang , Department of Computer Science and Engineering, Lehigh University, Bethlehem, PA 18015, USA
Dawei Yin , Department of Computer Science and Engineering, Lehigh University, Bethlehem, PA 18015, USA
Brian D. Davison , Department of Computer Science and Engineering, Lehigh University, Bethlehem, PA 18015, USA
pp. 566-571

Social networks and quality of life: The national health interview survey (Abstract)

Azadeh Hemmati , Complex Systems Research Group, Project Management Program, University of Sydney, NSW 2006, Australia
Kon Shing Kenneth Chung , Complex Systems Research Group, Project Management Program, University of Sydney, NSW 2006, Australia
pp. 572-579

Community discovery using social links and author-based sentiment topics (Abstract)

Baoguo Yang , Department of Computer Science, University of York, UK
Suresh Manandhar , Department of Computer Science, University of York, UK
pp. 580-587

Field selection for job categorization and recommendation to social network users (Abstract)

Emmanuel Malherbe , École centrale Paris, MAS, F-92 295, Châtenay-Malabry, France
Mamadou Diaby , Université Paris 13, Sorbonne Paris Cité, L2TI, F-93430, Villetaneuse, France
Mario Cataldi , Université Paris 8 - IUT de Montreuil, LIASD, EA 4383, Saint-Denis, France
Emmanuel Viennet , Université Paris 13, Sorbonne Paris Cité, L2TI, F-93430, Villetaneuse, France
Marie-Aude Aufaure , École centrale Paris, MAS, F-92 295, Châtenay-Malabry, France
pp. 588-595

Application of network analysis on healthcare (Abstract)

Fei Wang , School of IT, University of Sydney, Australia
Uma Srinivasan , Capital Markets Cooperative Research Centre, Sydney, Australia
Shahadat Uddin , Complex Systems Research Centre, University of Sydney, Australia
Sanjay Chawla , School of IT, University of Sydney, Australia
pp. 596-603

Populating knowledge base with collective entity mentions: A graph-based approach (Abstract)

Hailun Lin , CAS Key Laboratory of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China, 100190
Yantao Jia , CAS Key Laboratory of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China, 100190
Yuanzhuo Wang , CAS Key Laboratory of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China, 100190
Xiaolong Jin , CAS Key Laboratory of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China, 100190
Xiaojing Li , CAS Key Laboratory of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China, 100190
Xueqi Cheng , CAS Key Laboratory of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China, 100190
pp. 604-611

Personalized paper recommendation in online social scholar system (Abstract)

Huan Xue , Institute of Computing Technology, CAS, Beijing, China
Jiafeng Guo , Institute of Computing Technology, CAS, Beijing, China
Yanyan Lan , Institute of Computing Technology, CAS, Beijing, China
Lei Cao , Institute of Computing Technology, CAS, Beijing, China
pp. 612-619

Using sentiment to detect bots on Twitter: Are humans more opinionated than bots? (Abstract)

John P. Dickerson , Carnegie Mellon University, Pittsburgh, PA, USA
Vadim Kagan , Sentimetrix, Inc., Bethesda, MD, USA
V.S. Subrahmanian , University of Maryland, College Park, USA
pp. 620-627

Adjustments to propensity score matching for network structures (Abstract)

Masoud Charkhabi , Advanced Analytics, Canadian Imperial Bank of Commerce, Toronto, Ontario, Canada
pp. 628-633

Handling incomplete data using semantic logging based Social Network Analysis Hexagon for effective application monitoring and management (Abstract)

Omair Shafiq , Department of Computer Science, University of Calgary, Alberta, Canada
Reda Alhajj , Department of Computer Science, University of Calgary, Alberta, Canada
Jon G. Rokne , Department of Computer Science, University of Calgary, Alberta, Canada
pp. 634-641

Characterizing emotion entrainment in social media (Abstract)

Saike He , State Key Laboratory of Management and Control for Complex Systems, Institute of Automation, Chinese Academy of Sciences, Beijing 100190, China
Xiaolong Zheng , State Key Laboratory of Management and Control for Complex Systems, Institute of Automation, Chinese Academy of Sciences, Beijing 100190, China
Xiuguo Bao , CNCERT/CC, Beijing, China
Hongyuan Ma , CNCERT/CC, Beijing, China
Daniel Zeng , State Key Laboratory of Management and Control for Complex Systems, Institute of Automation, Chinese Academy of Sciences, Beijing 100190, China
Bo Xu , Institute of Automation, Chinese Academy of Sciences, Beijing 100190, China
Changliang Li , Institute of Automation, Chinese Academy of Sciences, Beijing 100190, China
Hongwei Hao , Institute of Automation, Chinese Academy of Sciences, Beijing 100190, China
pp. 642-648

SansText: Classifying temporal topic dynamics of Twitter cascades without tweet text (Abstract)

Shashidhar Sundereisan , Department of Computer Science, Virginia Tech., USA
Abhay Bhadriraju , Department of Electrical and Computer Engineering, Virginia Tech., USA
M. Saquib Khan , Department of Computer Science, Virginia Tech., USA
Naren Ramakrishnan , Department of Computer Science, Virginia Tech., USA
B. Aditya Prakash , Department of Computer Science, Virginia Tech., USA
pp. 649-656

OpenKN: An open knowledge computational engine for network big data (Abstract)

Yantao Jia , CAS Key Laboratory of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
Yuanzhuo Wang , CAS Key Laboratory of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
Xueqi Cheng , CAS Key Laboratory of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
Xiaolong Jin , CAS Key Laboratory of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
Jiafeng Guo , CAS Key Laboratory of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
pp. 657-664

CAPER: Crawling and analysing Facebook for intelligence purposes (Abstract)

Carlo Aliprandi , Synthema srl, Pisa, Italy
Antonio E. De Luca , Synthema srl, Pisa, Italy
Giulia Di Pietro , Synthema srl, Pisa, Italy
Matteo Raffaelli , Synthema srl, Pisa, Italy
Davide Gazze , Istituto di Informatica e Telematica - CNR, Pisa, Italy
Mariantonietta N. La Polla , Istituto di Informatica e Telematica - CNR, Pisa, Italy
Andrea Marchetti , Istituto di Informatica e Telematica - CNR, Pisa, Italy
Maurizio Tesconi , Istituto di Informatica e Telematica - CNR, Pisa, Italy
pp. 665-669

Online Naive Bayes classification for network intrusion detection (Abstract)

Fatma Gumus , Dept. of Computer Engineering, Istanbul University, Turkey
C. Okan Sakar , Dept. of Computer Engineering, Bahcesehir University, Turkey
Zeki Erdem , TÜBİTAK-BİLGEM, Kocaeli, Turkey
Olcay Kursun , Dept. of Computer Engineering, Istanbul University, Turkey
pp. 670-674

Exploring UK crime networks (Abstract)

Giles Oatley , Department of Computing, Cardiff Metropolitan University, UK
Tom Crick , Department of Computing, Cardiff Metropolitan University, UK
pp. 675-678

Cascading failures of social networks under attacks (Abstract)

Chengqi Yi , School of Computer Science and Technology, Harbin University of Science and Technology, 150080, China
Yuanyuan Bao , Tsinghua National Lab for Information Science and Technology, Tsinghua University, Beijing, 100084, China
Jingchi Jiang , School of Computer Science and Technology, Harbin University of Science and Technology, 150080, China
Yibo Xue , Tsinghua National Lab for Information Science and Technology, Tsinghua University, Beijing, 100084, China
Yingfei Dong , Department of Electrical Engineering, University of Hawaii, Honolulu 96822, USA
pp. 679-686

Understanding South Asian Violent Extremist Group-group interactions (Abstract)

D.B. Skillicorn , School of Computing, Queen's University, Kingston. Canada
F. Spezzano , Department of Computer Science, University of Maryland, USA
V.S. Subrahmanian , Department of Computer Science, University of Maryland, USA
M. Garber , Department of Computer Science, University of Maryland, USA
pp. 687-694

Semantic crawling: An approach based on Named Entity Recognition (Abstract)

Giulia Di Pietro , Synthema srl, Pisa, Italy
Carlo Aliprandi , Synthema srl, Pisa, Italy
Antonio E. De Luca , Synthema srl, Pisa, Italy
Matteo Raffaelli , Synthema srl, Pisa, Italy
Tiziana Soru , Synthema srl, Pisa, Italy
pp. 695-699

Prediction and analysis of Pakistan election 2013 based on sentiment analysis (Abstract)

Muhammad Asif Razzaq , School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad, Pakistan
Ali Mustafa Qamar , School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad, Pakistan
Hafiz Syed Muhammad Bilal , School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad, Pakistan
pp. 700-703

The security awareness paradox: A case study (Abstract)

Muhammad Adnan Tariq , KTH Royal Institute of Technology, SE-100 44 Stockholm, Sweden
Joel Brynielsson , KTH Royal Institute of Technology, SE-100 44 Stockholm, Sweden
Henrik Artman , KTH Royal Institute of Technology, SE-100 44 Stockholm, Sweden
pp. 704-711

Estimating the size of hidden data sources by queries (Abstract)

Yan Wang , School of Information, Central University of Finance and Economics, Beijing, China
Jie Liang , BiblioCommons Inc., Toronto, Canada
Jianguo Lu , School of Computer Science, University of Windsor, Canada
pp. 712-719

OSINT for B2B platforms (Abstract)

V.F. Pais , SC Cloud Research Studio SRL, Bucharest, Romania
D.S. Ciobanu , SC Cloud Research Studio SRL, Bucharest, Romania
pp. 720-723

Detecting key individuals in terrorist network based on FANP model (Abstract)

Ze Li , School of Information System and Management, National University of Defense Technology, Changsha, China
Duo-yong Sun , School of Information System and Management, National University of Defense Technology, Changsha, China
Shu-quan Guo , School of Information System and Management, National University of Defense Technology, Changsha, China
Bo Li , School of Information System and Management, National University of Defense Technology, Changsha, China
pp. 724-727

Big Data in Health Informatics Architecture (Abstract)

Egondu Rosemary Onyejekwe , Springer Science+Business Media and Editorial Board, Journal of Network Modelling Analysis in Health, Informatics and Bioinformatics (NetMAHIB), Cateret, NJ. USA
pp. 728-736

Improving energetic feature selection to classify protein-protein interactions (Abstract)

Tatiana Gutierrez-Bunster , Department of Computer Science, University of Victoria. BC. Canada
German Poo-Caamano , Department of Computer Science, University of Victoria. BC. Canada
pp. 737-743

How do biological networks differ from social networks? (an experimental study) (Abstract)

Tatiana Gutierrez-Bunster , Department of Computer Science, University of Victoria. BC. Canada
Ulrike Stege , Department of Computer Science, University of Victoria. BC. Canada
Alex Thomo , Department of Computer Science, University of Victoria. BC. Canada
John Taylor , Department of Biology, University of Victoria. BC. Canada
pp. 744-751

Evidence from the randomized controlled trials of Traditional Chinese Medicine compound in treating Alzheimer's disease (Abstract)

Xue-Qin Hou , Guangzhou University of Chinese Medicine, 510405, China
Yue Li , Guangzhou University of Chinese Medicine, 510405, China
Jian-Li Qiu , Guangzhou University of Chinese Medicine, 510405, China
Feng Huang , The First Affiliated Hospital of Guangzhou University of Chinese Medicine, 510405, China
pp. 752-758

A fast sorting algorithm for aptamer identification using deep sequencing (Abstract)

Yiou Xiao , Department of EECS, Syracuse University, NY, USA
Kishan G. Mehrotra , Department of EECS, Syracuse University, NY, USA
Damian G. Allis , Department of Chemistry, Syracuse University, NY, USA
Phillip N. Borer , Department of Chemistry, Syracuse University, NY, USA
pp. 759-763

Tracking dynamic community evolution in social networks (Abstract)

Zeineb Dhouioui , Computer Science Department, ISG, 41, rue de la Liberté, 2000 Le Bardo Tunisia
Jalel Akaichi , Computer Science Department, ISG, 41, rue de la Liberté, 2000 Le Bardo Tunisia
pp. 764-770

Competition between real-life friends and virtual-life friends (Abstract)

Bin Fang , School of Management, Harbin Institute of Technology, China
Qiang Ye , School of Management, Harbin Institute of Technology, China
pp. 771-777

Location inference using microblog text and friendships (Abstract)

Chuanyang Li , School of Computer Science, Beijing University of Posts and Telecommunications, China
Xiuqin Lin , School of Computer Science, Beijing University of Posts and Telecommunications, China
Bin Wu , School of Computer Science, Beijing University of Posts and Telecommunications, China
Chuan Shi , School of Computer Science, Beijing University of Posts and Telecommunications, China
pp. 778-784

Sentiment analysis of microblog combining dictionary and rules (Abstract)

Ding Yuan , School of Computers, Beijing University of Posts and Telecommunications, China
Yanquan Zhou , School of Computers, Beijing University of Posts and Telecommunications, China
Ruifan Li , School of Computers, Beijing University of Posts and Telecommunications, China
Peng Lu , School of Computers, Beijing University of Posts and Telecommunications, China
pp. 785-789

Using single source data to better understand User-generated Content (UGC) behavior (Abstract)

Heng Lu , Web Mining Lab, Department of Media and Communication, City University of Hong Kong, Hong Kong
Jonathan J.H. Zhu , Web Mining Lab, Department of Media and Communication, City University of Hong Kong, Hong Kong
pp. 790-795

Research and implementation of algorithm for short videos recommendation (Abstract)

Lai Jiang , School of Software Engineering, Beijing University of Posts and Telecommunications, BUPT, China
Xiangling Fu , School of Software Engineering, Beijing University of Posts and Telecommunications, BUPT, China
pp. 796-801

The comparison study on the motivations of staffs' behaviors on public and enterprise social network: Evidence from China (Abstract)

Miaomiao Xiong , School of Economics and Management, Beijing University of Posts and Telecommunications, China
Qing Chen , Department of Management Information System, China Mobile Communications Corporation, Beijing, China
Angela Zhao , Rotterdam School of Management, Erasmus University, The Netherlands
pp. 802-807

Structural and regular equivalence of community detection in social networks (Abstract)

Sovatana Hour , School of Computer Science and Technology, Beijing Institute of Technology, 100081, China
Li Kan , School of Computer Science and Technology, Beijing Institute of Technology, 100081, China
pp. 808-813

UGC collection strategy oriented user influence classification and feature analysis (Abstract)

Yue Zhai , Beijing University of Posts and Telecommunications, China
Lei Li , Beijing University of Posts and Telecommunications, China
pp. 814-819

Research on the selecting mechanism of individual interactive object for online social network (Abstract)

Yujie Pang , International School, Beijing University of Posts and Telecommunications, School of Public Administration and Policy, Renmin University of China, China
Shiyu Du , School of Economics and Management, Beijing University of Posts and Telecommunications, China
pp. 820-827

Associations between personal social network properties and mental health in cancer care (Abstract)

Azadeh Hemmati , Complex Systems Research Group, Project Management Program, University of Sydney, NSW 2006, Australia
Kon Shing Kenneth Chung , Complex Systems Research Group, Project Management Program, University of Sydney, NSW 2006, Australia
pp. 828-835

A study of age and gender seen through mobile phone usage patterns in Mexico (Abstract)

Carlos Sarraute , Grandata Labs, Argentina
Pablo Blanc , Mathematics Dept., FCEN, UBA, Argentina
Javier Burroni , Grandata Labs, Argentina
pp. 836-843

Dynamic feedback mechanism for maximizing interaction in online social network services (Abstract)

Kyudong Park , Department of Creative IT Engineering, Pohang University of Science and Technology (POSTECH), South Korea
Seungjae Oh , Department of Creative IT Engineering, Pohang University of Science and Technology (POSTECH), South Korea
Heung-Chang Lee , Department of Creative IT Engineering, Pohang University of Science and Technology (POSTECH), South Korea
Hyo-Jeong So , Department of Creative IT Engineering, Pohang University of Science and Technology (POSTECH), South Korea
pp. 844-849

Activity profiles in online social media (Abstract)

Mohamed Faouzi Atig , Dep. of Inf. Tech., Uppsala University, Sweden
Sofia Cassel , Dep. of Inf. Tech., Uppsala University, Sweden
Lisa Kaati , FOI, Swedish Defence Research Agency, Sweden
Amendra Shrestha , Dep. of Inf. Tech., Uppsala University, Sweden
pp. 850-855

Extension of Modularity Density for overlapping community structure (Abstract)

Mingming Chen , Department of Computer Science, Rensselaer Polytechnic Institute, 110 8th Street, Troy, NY 12180, USA
Konstantin Kuzmin , Department of Computer Science, Rensselaer Polytechnic Institute, 110 8th Street, Troy, NY 12180, USA
Boleslaw K. Szymanski , Department of Computer Science, Rensselaer Polytechnic Institute, 110 8th Street, Troy, NY 12180, USA
pp. 856-863

The same network - different communities? The multidimensional study of groups in the cyberspace (Abstract)

Radoslaw Michalski , Institute of Informatics, Wrocław Univ. of Technology, Wybrzeże Wyspiańskiego 27, 50-370, Poland
Jaroslaw Jankowski , Faculty of Computer Science, West Pomeranian University of Technology, Żołnierska 49, 71-210 Szczecin, Poland
Piotr Brodka , Institute of Informatics, Wrocław Univ. of Technology, Wybrzeże Wyspiańskiego 27, 50-370, Poland
Przemyslaw Kazienko , Institute of Informatics, Wrocław Univ. of Technology, Wybrzeże Wyspiańskiego 27, 50-370, Poland
pp. 864-869

Local representatives in weighted networks (Abstract)

Sarka Zehnalova , VSB - Technical University of Ostrava, Czech Republic
Milos Kudelka , VSB - Technical University of Ostrava, Czech Republic
Jan Platos , VSB - Technical University of Ostrava, Czech Republic
Zdenek Horak , Inflex, s.r.o., Olomouc, Czech Republic
pp. 870-875

PEVNET: A framework for visualization of criminal networks (Abstract)

Amer Rasheed , The Maersk Mc-Kinney Moeller Institute, University of Southern Denmark, Campusvej 55, 5230 Odense M, Denmark
Uffe Kock Wiil , The Maersk Mc-Kinney Moeller Institute, University of Southern Denmark, Campusvej 55, 5230 Odense M, Denmark
pp. 876-881

Incremental solutions to online multi-unit combinatorial auctions for information feedback (Abstract)

Sivaraman Ramanathan , McKinsey & Company, Chennai, India
Avinash Kasinathan , McKinsey & Company, Chennai, India
Anup K Sen , Indian Institute of Management Calcutta, Kolkata, India
pp. 882-889

Analysis of two crime-related networks derived from bipartite social networks (Abstract)

Taher Alzahrani , School of Mathematical and Geospatial Sciences, RMIT University, Melbourne 3000, Australia
K. J. Horadam , School of Mathematical and Geospatial Sciences, RMIT University, Melbourne 3000, Australia
pp. 890-897

Link discovery in social networks (Abstract)

Flavio Cirillo , NEC Laboratories Europe, Kurfürsten-Anlage 36, 69115 Heidelberg, Germany
Tobias Jacobs , NEC Laboratories Europe, Kurfürsten-Anlage 36, 69115 Heidelberg, Germany
pp. 898-905

Optimal strategies for targeted influence in signed networks (Abstract)

Basak Guler , Wireless Communications and Networking Laboratory, Department of Electrical Engineering, The Pennsylvania State University, University Park, 16802, USA
Burak Varan , Wireless Communications and Networking Laboratory, Department of Electrical Engineering, The Pennsylvania State University, University Park, 16802, USA
Kaya Tutuncuoglu , Wireless Communications and Networking Laboratory, Department of Electrical Engineering, The Pennsylvania State University, University Park, 16802, USA
Mohamed Nafea , Wireless Communications and Networking Laboratory, Department of Electrical Engineering, The Pennsylvania State University, University Park, 16802, USA
Ahmed A. Zewail , Wireless Communications and Networking Laboratory, Department of Electrical Engineering, The Pennsylvania State University, University Park, 16802, USA
Aylin Yener , Wireless Communications and Networking Laboratory, Department of Electrical Engineering, The Pennsylvania State University, University Park, 16802, USA
Damien Octeau , Department of Computer Science and Engineering, The Pennsylvania State University, University Park, 16802, USA
pp. 906-911

Rumors detection in Chinese via crowd responses (Abstract)

Guoyong Cai , Guangxi Key Lab of Trusted Software, Guilin University of Electronic Technology, 541004, China
Hao Wu , Guangxi Key Lab of Trusted Software, Guilin University of Electronic Technology, 541004, China
Rui Lv , Guangxi Key Lab of Trusted Software, Guilin University of Electronic Technology, 541004, China
pp. 912-917

A novel method for computer video leaking signal detection (Abstract)

Jun Shi , Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Wei-qing Huang , Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Dong Wei , Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
De-gang Sun , Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
pp. 918-923

Simpler is better? Lexicon-based ensemble sentiment classification beats supervised methods (Abstract)

Lukasz Augustyniak , Wroclaw University of Technology, Institute of Informatics, Poland
Tomasz Kajdanowicz , Wroclaw University of Technology, Institute of Informatics, Poland
Piotr Szymanski , Wroclaw University of Technology, Institute of Informatics, Poland
Wlodzimierz Tuliglowicz , Wroclaw University of Technology, Institute of Informatics, Poland
Przemyslaw Kazienko , Wroclaw University of Technology, Institute of Informatics, Poland
Reda Alhajj , Wroclaw University of Technology, Institute of Informatics, Poland
Boleslaw Szymanski , Wroclaw University of Technology, Institute of Informatics, Poland
pp. 924-929

Automatically identifying experts in on-line support forums using social interactions and post content (Abstract)

Tyler Munger , Baskin School of Engineering, University of California Santa Cruz, 95064, USA
Jiabin Zhao , Cisco Services Technology Group, Cisco Systems, San Jose, CA 95134, USA
pp. 930-935

Community-based cheater detection in location-based social networks (Abstract)

Wenjie Fan , Department of Information Systems, City University of Hong Kong, Hong Kong
Wei Fan , Department of Electronic Engineering, City University of Hong Kong, Hong Kong
Stephen Shaoyi Liao , Department of Information Systems, City University of Hong Kong, Hong Kong
Kai-Hau Yeung , Department of Electronic Engineering, City University of Hong Kong, Hong Kong
pp. 936-941

SDHM: A hybrid model for spammer detection in Weibo (Abstract)

Yu Liu , Beijing Key Laboratory of Intelligence Telecommunication Software and Multimedia, Beijing University of Posts and Telecommunications, China
Bin Wu , Beijing Key Laboratory of Intelligence Telecommunication Software and Multimedia, Beijing University of Posts and Telecommunications, China
Bai Wang , Beijing Key Laboratory of Intelligence Telecommunication Software and Multimedia, Beijing University of Posts and Telecommunications, China
Guanchen Li , Beijing Key Laboratory of Intelligence Telecommunication Software and Multimedia, Beijing University of Posts and Telecommunications, China
pp. 942-947

Using global diversity and local features to identify influential social network spreaders (Abstract)

Yu-Hsiang Fu , Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan, ROC
Chung-Yuan Huang , Department of Computer Science and Information Engineering, Chang Gung University, Taoyuan, Taiwan, ROC
Chuen-Tsai Sun , Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan, ROC
pp. 948-953

Epdemic spreading model based overlapping community detection (Abstract)

Ying Wen , International School, Beijing University of Posts and Telecommunications, China
Yuanhao Chen , International School, Beijing University of Posts and Telecommunications, China
Xiaolong Deng , Key Laboratory of Trustworthy Distributed Computing and Service, Beijing University of Posts and Telecommunications, China
pp. 954-959

Tag-based expert recommendation in community question answering (Abstract)

Baoguo Yang , Department of Computer Science, University of York, UK
Suresh Manandhar , Department of Computer Science, University of York, UK
pp. 960-963

Tell me who your friends are and I'll tell you who you are: Studying the evolution of collaborations in research environments (Abstract)

Mario Cataldi , Université Paris 8, France
Myriam Lamolle , Université Paris 8, France
Luigi Di Caro , Università di Torino, Italy
Claudio Schifanella , Università di Torino, Italy
pp. 964-967

Adaptive Post Recognition (Abstract)

Philipp Berger , Hasso-Plattner-Institute University of Potsdam, Germany
Patrick Hennig , Hasso-Plattner-Institute University of Potsdam, Germany
Dominic Petrick , Hasso-Plattner-Institute University of Potsdam, Germany
Marcel Pursche , Hasso-Plattner-Institute University of Potsdam, Germany
Christoph Meinel , Hasso-Plattner-Institute University of Potsdam, Germany
pp. 1-8
80 ms
(Ver 3.3 (11022016))