Filters








34,157 Hits in 9.7 sec

Evolutionary Network Analysis

Charu Aggarwal, Karthik Subbian
2014 ACM Computing Surveys  
This survey provides an overview of the vast literature on graph evolution analysis and the numerous applications that arise in different contexts.  ...  The analysis of such networks is especially challenging, because it needs to be performed with an online approach, under the one-pass constraint of data streams.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory  ... 
doi:10.1145/2601412 fatcat:hvm37apdbzgnzkgilt2te6gfba

Social Networking in Education

Niall McCarroll, Kevin Curran
2013 International Journal of Innovation in the Digital Economy  
Social networking has become one of the most popular communication tools to have evolved over the past decade, making it a powerful new information sharing resource in society.  ...  This paper focuses on the application of SNSs in a learning environment and the impact this could have on academic practices.  ...  Finally they propose a study of the role social networking plays in innovation to determine how SNSs relate to success.  ... 
doi:10.4018/jide.2013010101 fatcat:o6nerifvynbtvmpkkp7habaglu

PIB: Profiling Influential Blogger in Online Social Networks, A Knowledge Driven Data Mining Approach

G.U. Vasanthakumar, Bagul Prajakta, P. Deepa Shenoy, K.R. Venugopal, L.M. Patnaik
2015 Procedia Computer Science  
After constructing a social blogging site, a SBN is analyzed with appropriate parameters to get the Influential Blog Power (IBP) of each blogger in the network and demonstrate that profiling IB is adequate  ...  This work proposes a novel method of profiling Influential Blogger (IB) based on the activities performed on one's blog documents who influences various other bloggers in Social Blog Network (SBN).  ...  ., 6 proposed an approach to determine influential users in a blog network using classification and clustering techniques of data mining.  ... 
doi:10.1016/j.procs.2015.06.042 fatcat:pg6zhv7i6fcypcyymhchfoat5q

The Road to Emotion Mining in Social Network

Hany Mohamed, Ayman Ezzat, Mostafa Sami
2015 International Journal of Computer Applications  
In addition, an investigation for technology used in this area and how it is applied, will be presented.  ...  While emotion is a fundamental in human experience, it becomes an ideal resource for servicing business or decision making.  ...  We categorize them in both two main branches: Lexicon based Approaches and ML based Approaches. 1 Lexicon Based Approaches Key word Spotting It is the simplest technique in emotion mining area; it  ... 
doi:10.5120/ijca2015905779 fatcat:oqdev253irhmnoevoyfi4pvxxy

Survey on social networking services

Rizwana Irfan, Sajjad Ahmad Madani, Khizar Hayat, Hongxiang Li, Samee U. Khan, Rajiv Ranjan, Imran A. Khan, Joanna Kolodziej, Babar Nazir, Dan Chen, Lizhe Wang, Gage Bickler
2013 IET Networks  
The SNP is a Web-based social space, specifically designed for end user-driven applications that facilitate communication, collaboration, and sharing of the knowledge through a variety of SNSs, such as  ...  The social computing, such as Social Networking services (SNSs) and social Networking Platforms (SNPs) provide a coherent medium through which people can be interactive and socialize.  ...  Acknowledgements We are grateful to Juan Li, Matthew Warner, and Daniel Grages for their feedback on draft of this survey report. Samee U.  ... 
doi:10.1049/iet-net.2013.0009 fatcat:gpnxhfeuqfgsxjpzpo7nk7sc5e

Photo-based authentication using social networks

Sarita Yardi, Nick Feamster, Amy Bruckman
2008 Proceedings of the first workshop on Online social networks - WOSP '08  
We present Lineup, a system that uses the social network graph in Facebook and auxiliary information (e.g., "tagged" user photos) to build a photo-based Web site authentication framework.  ...  Lineup works by presenting a user with photographs and asking the user to identify subjects in the photo whom a user with the appropriate identity or group membership should know.  ...  of users and content in a graph for building trust into distributed systems.  ... 
doi:10.1145/1397735.1397748 dblp:conf/wosn/YardiFB08 fatcat:6xzcgwvzajbhldou6y4aeurgsy

Media Monitoring Using Social Networks

Tony White, Wayne Chu, Amiral Salehi-Abari
2010 2010 IEEE Second International Conference on Social Computing  
To do this, we will use the power of social networks to limit the scope of search queries such that a simple keyword such as "budget" will return only pages that the user will want to see.  ...  Since the blogosphere constitutes a social network, the solution, BlogCrawler, attempts to use the properties of social networks to narrow the focus of search queries to only those blogs that the user  ...  I would also like to acknowledge Bart Ramson who got me blogging in the first place. iii Media Monitoring Using Social Networks Wayne Chu (100280442)  ... 
doi:10.1109/socialcom.2010.102 dblp:conf/socialcom/WhiteCS10 fatcat:gvjjxe5nlbhpjdvjb7auwbk3cy

Data Mining in Social Media [chapter]

Geoffrey Barbier, Huan Liu
2011 Social Network Data Analytics  
The rise of online social media is providing a wealth of social network data.  ...  This chapter introduces the basics of data mining, reviews social media, discusses how to mine social media data, and highlights some illustrative examples with an emphasis on social networking sites and  ...  Acknowledgements The authors recognize the positive dialogue with all of the researchers in Arizona State University's Data Mining and Machine Learning Laboratory that continually help motivate and inspire  ... 
doi:10.1007/978-1-4419-8462-3_12 fatcat:hbngavq4frhl7fenghg6rlomn4

Distributed network intelligence: A prerequisite for adaptive and personalised service delivery

M. J. O'Grady, G. M. P. O'Hare, J. Chen, D. Phelan
2008 Information Systems Frontiers  
As an illustration of the viability of this approach, a brief description of a mobile blogging application is presented.  ...  Hence, the academic and commercial interest in harnessing intelligent techniques as a means of mitigating these concerns, and ensuring the user experience is a satisfactory one.  ...  Content-based filtering approaches use descriptions of the content of the items to determine a relationship between a single user and the description of the items.  ... 
doi:10.1007/s10796-008-9140-1 fatcat:rp4tktqdznbfrng4xxr5upnx4a

Social networking trends and dynamics detection via a cloud-based framework design

Athena Vakali, Maria Giatsoglou, Stefanos Antaris
2012 Proceedings of the 21st international conference companion on World Wide Web - WWW '12 Companion  
Social networking media generate huge content streams, which leverage, both academia and developers efforts in providing unbiased, powerful indications of users' opinion and interests.  ...  Here, we present Cloud4Trends, a framework for collecting and analyzing user generated content through microblogging and blogging applications, both separately and jointly, focused on certain geographical  ...  MICROBLOGGING AND BLOGGING TREND DETECTION: CURRENT STATUS The massive sizes of user generated content (UGC) in microblogging and blogging applications, sets the potential to proceed with its consideration  ... 
doi:10.1145/2187980.2188263 dblp:conf/www/VakaliGA12 fatcat:acvu73g2sjf4rjk4vhyf4guvde

Identification of influential social networkers

Magdalini Eirinaki, Sumit Pal Singh Monga, Shreedhar Sundaram
2012 International Journal of Web Based Communities  
In this paper we present a method aiming at identifying the influential users within an online social networking application.  ...  We also integrate all three metrics in a unified metric and measure its performance.  ...  In essence, a user with high Betweenness Centrality is an important factor determining what information is spread to which other users, and how fast (since it is up to the user to decide whether to forward  ... 
doi:10.1504/ijwbc.2012.046256 fatcat:tlytxga3uzhbnfx7tywqx4ljxe

Marketing Opportunities withSocial Networks

Victoria Bolotaeva, Teuta Cata
2011 Journal of Internet Social Networking and Virtual Communities  
Even though social network marketing is still in its infancy, it holds a potential success for businesses if it is carefully integrated in the marketing mix.  ...  Social networks are websites which allow users to communicate, share knowledge about similar interests, discuss favorite topics, review and rate products/services, etc.  ...  As Pettey (2008) explains, businesses should establish their networking presence on content produced by members, and then develop strong applications in order to encourage users to engage members in supplying  ... 
doi:10.5171/2011.409860 fatcat:v7dbl4uawnfwrezphw2a6vu3o4

Social Networking: An astronomer's field guide [article]

E. L. Gomez, H. L. Gomez, J. Yardley
2009 arXiv   pre-print
We present a brief introduction to the phenomenon of "social networking" and its potentially powerful use as an astronomy outreach and educational tool.  ...  We briefly discuss the development of applications for websites and facebook and the use of web trackers e.g. Google Analytics to analyze your audience.  ...  Acknowledgements The Impact Calculator was developed as part of Down2Earth, an educational project funded by an STFC Science Centre Award, held by the National Museum of Wales.  ... 
arXiv:0903.0266v1 fatcat:e3vmf2zajzeh7h77zt6vh6sn3a

Networked Interactivity

Sheizaf Rafaeli, Fay Sudweeks
2006 Journal of Computer-Mediated Communication  
According to the model, an organization wishing to build an attractive image should communicate with its publics in a two-way fashion and be ready to change in accordance with people's preferences.  ...  The method of content analysis is employed in the study in order to establish instances of twoway communication between the members of the group and its moderators.  ...  For instance, White (2012) argues that a position of any Russian party should be determined according to its relations to the Kremlin and its party of power.  ... 
doi:10.1111/j.1083-6101.1997.tb00201.x fatcat:mzfxtw77rfag7jtfhzysysgrbq

Schematizing Trust in Named Data Networking

Yingdi Yu, Alexander Afanasyev, David Clark, kc claffy, Van Jacobson, Lixia Zhang
2015 Proceedings of the 2nd International Conference on Information-Centric Networking - ICN '15  
Our experience suggests that this approach has the potential of being generally applicable to a wide range of NDN applications.  ...  Securing communication in network applications involves many complex tasks that can be daunting even for security experts.  ...  Besides being a transport unit as an IP packet, an NDN data packet is also a storage unit, so that the signature carried in a data packet secures its content whether the packet is in motion or in storage  ... 
doi:10.1145/2810156.2810170 dblp:conf/acmicn/YuACcJ015 fatcat:5wcvrx6qbrebbah6qtwwzvgohi
« Previous Showing results 1 — 15 out of 34,157 results