327,447 Hits in 8.4 sec

Extracting Actionable Knowledge from Social Networks using Structural Features

Nasrin Kalanat, Eynollah Khanjari, Alireza Khanshan
2020 IEEE Access  
Actionable knowledge discovery is a field of study specifically developed for this matter. Existing methods rarely tackled the problem of extracting actionable knowledge from social networks.  ...  INDEX TERMS Social networks mining, action mining, actionable knowledge discovery, structural features, change propagation, change-awareness.  ...  knowledge from social networks.  ... 
doi:10.1109/access.2020.2983146 fatcat:pzmygpvgbrcedi3utq72csb6vm

Sketched Reality: Sketching Bi-Directional Interactions Between Virtual and Physical Worlds with AR and Actuated Tangible UI [article]

Hiroki Kaimoto, Kyzyl Monteiro, Mehrad Faridan, Jiatong Li, Samin Farajian, Yasuaki Kakehi, Ken Nakagaki, Ryo Suzuki
2022 arXiv   pre-print
from the Node.js server to the browser.  ...  We believe Existing AR Our Focus Figure 2 : While, in conventional AR (such as in [52] ), the virtual graphical information is affected by physical objects and actions, Sketched Reality explores how  ... 
arXiv:2208.06341v1 fatcat:wk2gn2r52bghpeidu3badrsimq

Extracting social events for learning better information diffusion models

Shuyang Lin, Fengjiao Wang, Qingbo Hu, Philip S. Yu
2013 Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '13  
In this paper, we extract social events from data streams in social networks, and then use the extracted social events to improve the learning of information diffusion models.  ...  Existing approaches learn the diffusion models from events in social networks. However, events in social networks may have different underlying reasons.  ...  Different from existing approaches, we extract social events from the data stream, and learn the diffusion model from the extracted social events.  ... 
doi:10.1145/2487575.2487584 dblp:conf/kdd/LinWHY13 fatcat:gszdcrdo6fgrreco6gtdwgd6ca

Finding her master's voice: the power of collective action among female muslim bloggers

Nitin Agarwal, Merlyna Lim, Rolf T. Wigand
2011 European Conference on Information Systems  
on collective action and computational social network analysis.  ...  This paper contributes a methodology to study the diffusion of issues in social networks and examines roles of influential community members.  ...  Acknowledgement This research was funded in part by the National Science Foundation's Social-Computational Systems (SoCS) Program within the Directorate for Computer & Information Science (CISE) & Engineering's  ... 
dblp:conf/ecis/AgarwalLW11 fatcat:vkky65qsrjfg7emfwaq5mbggnm

Summarization of social activity over time

Yu-Ru Lin, Hari Sundaram, Aisling Kelliher
2008 Proceeding of the 17th ACM conference on Information and knowledge mining - CIKM '08  
The problem is important in understanding large scale online social networks, which have diverse social interactions and exhibit temporal dynamics.  ...  Activity themes are extracted from the derived latent spaces to construct group activity summary.  ...  INTRODUCTION This paper focuses on the summarization of social activity in online social networks.  ... 
doi:10.1145/1458082.1458289 dblp:conf/cikm/LinSK08 fatcat:bw2w53tbl5h45aifyg247jruwe

Summarization of large scale social network activity

Yu-Ru Lin, Hari Sundaram, Aisling Kelliher
2009 2009 IEEE International Conference on Acoustics, Speech and Signal Processing  
The networks exhibit heterogeneous social interactions and temporal dynamics.  ...  This paper presents a novel social media summarization framework. Summarizing media created and shared in large scale online social networks unfolds challenging research problems.  ...  INTRODUCTION We present a method for automatically summarizing social media created from online social networks.  ... 
doi:10.1109/icassp.2009.4960375 dblp:conf/icassp/LinSK09 fatcat:4lur6dzgjrekpcjhzjh2exudgu

Multi-Relational Characterization of Dynamic Social Network Communities [chapter]

Yu-Ru Lin, Hari Sundaram, Aisling Kelliher
2010 Handbook of Social Network Technologies and Applications  
have shown that individual behaviors usually result from mechanisms depending on their social networks, e.g. social ebeddedness [17] and influence [13] .  ...  Human activity is mostly social, and the social networks of human are conceivable loci for the construction of meaning.  ...  Extracting Communities from Rich-context Social Networks We focus on the multi-relational network observed from the social media.  ... 
doi:10.1007/978-1-4419-7142-5_18 fatcat:4hj5h3z6y5a2jc2rxiocfqcsb4

Influence Cascades: Entropy-Based Characterization of Behavioral Influence Patterns in Social Media

Chathurani Senevirathna, Chathika Gunaratne, William Rand, Chathura Jayalath, Ivan Garibay
2021 Entropy  
We investigate these influence patterns within and across online social media platforms using empirical data and comparing to a scale-free network as a null model.  ...  One such attribute could be whether the action is an initiation of a new post, a contribution to a post, or a sharing of an existing post.  ...  Introduction Social influence in online social networks (OSNs) can be defined as the ability of a user's action to affect the actions of other users.  ... 
doi:10.3390/e23020160 pmid:33525557 fatcat:tnnepyio6va7voonbxhiml6mzi

Understanding Community Dynamics in Online Social Networks: A multidisciplinary review

Hari Sundaram, Yu-Ru Lin, Munmun De Choudhury, Aisling Kelliher
2012 IEEE Signal Processing Magazine  
Social network sites provide new opportunities for social-technological research.  ...  With special emphasis on social communities mediated by network technologies, we review the historical research arc of community analysis as well as methods applicable to community discovery in social  ...  We specifically discussed several modes of interaction, available to users in online social networks, including actions related to communication and social actions.  ... 
doi:10.1109/msp.2011.943583 fatcat:k5obrcnbfrevbiuqrxx4gteqq4

A Two-Stage Model for Social Network Investigations in Digital Forensics

Anne David
2020 Journal of Digital Forensics, Security and Law  
The objective of this paper is consequently to propose an approach that can be applied as a formal technique for social network investigations Extracting Features from Social Networking Artifacts Due  ...  For example, the social network site visited or the actions performed by the user (search, follow).  ... 
doi:10.15394/jdfsl.2020.1667 fatcat:7rq55mhopzawzewogxwbg7zro4

Commentary on the Legal Practice of Database Protection Protection of Allied Rights to Database: V Kontakte Ltd. v. Dabl Ltd

Maria Kolsdorf
2020 Legal Issues in the Digital Age  
Assuming that the actions of the "DABL" company include the extraction and use of a substantial part of elements from the social database's users, which runs counter to normal social database use and is  ...  -Trans.] for a ruling that the actions of the Respondents in extraction and subsequent use of information elements from the database of the "V Kontakte" social network's users constitute a violation of  ... 
doi:10.17323/2713-2749.2020.1.124.134 fatcat:wkzb6s7pwfbxfjb7sdpoq7xdj4

Discovering influential nodes from trust network

Sabbir Ahmed, C. I. Ezeife
2013 Proceedings of the 28th Annual ACM Symposium on Applied Computing - SAC '13  
Influence maximization (IM) task is used to discover such influential nodes (or customers) from a social network.  ...  In this work, we propose the T-GT model, which considers both positive (trust) and negative (distrust) influences in social trust networks.  ...  Action log are extracted from log of user activity in a social network site databases. Tuples in Action log table contains, for e.g.  ... 
doi:10.1145/2480362.2480389 dblp:conf/sac/AhmedE13 fatcat:3r7r7u3kkfgsxpzl4xrgkmhgve

Inferring privacy policies for social networking services

George Danezis
2009 Proceedings of the 2nd ACM workshop on Security and artificial intelligence - AISec '09  
Social networking sites have come under criticism for their poor privacy protection track record.  ...  A machine learning approach is used to extract automatically such social contexts, as well as a tentative evaluation.  ...  Emilia Käsper and Parka Poser provided valuable feedback on the quality of the sub-group extraction.  ... 
doi:10.1145/1654988.1654991 dblp:conf/ccs/Danezis09 fatcat:mipno37hojgjvgrdam6tyn3vxm

A Model for Handling Multiple Social Networks, its Implementation

Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera
2017 Sistemi Evoluti per Basi di Dati  
social networks.  ...  In this paper, we define a model aimed at generalizing concepts, actions and relationships of existing social networks, which can be exploited as a middleware to implement applications working on multiple  ...  It is well known that any analysis activity on social network users needs a preliminary task implementing the extraction of data from social networks.  ... 
dblp:conf/sebd/BuccafurriLNN17 fatcat:no7y7xrgn5b3nbybjhfm6c322m

Deep Agent: Studying the Dynamics of Information Spread and Evolution in Social Networks [article]

Ivan Garibay, Toktam A. Oghaz, Niloofar Yousefi, Ece C. Mutlu, Madeline Schiappa, Steven Scheinert, Georgios C. Anagnostopoulos, Christina Bouwens, Stephen M. Fiore, Alexander Mantzaris, John T. Murphy, William Rand (+14 others)
2021 arXiv   pre-print
This paper explains the design of a social network analysis framework, developed under DARPA's SocialSim program, with novel architecture that models human emotional, cognitive and social factors.  ...  Our simulation effort helps in understanding how information flows and evolves in social media platforms.  ...  The GitHub social network data contained information from the years 2015 to 2017.  ... 
arXiv:2003.11611v2 fatcat:jplfsweeyrfj3fftlaa2ejjtgy
« Previous Showing results 1 — 15 out of 327,447 results