default search action
SocialCom/PASSAT 2011: Boston, MA, USA
- PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Conference on Social Computing (SocialCom), Boston, MA, USA, 9-11 Oct., 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1931-8
SocialCom 2011
Social Networks
- Kevin Robert Canini, Bongwon Suh, Peter Pirolli:
Finding Credible Information Sources in Social Networks Based on Content and Social Structure. 1-8 - Kwan Hong Lee, Andrew Lippman, Alex Pentland, Elenna R. Dugundji:
The Impacts of Just-in-Time Social Networks on People's Choices in the Real World. 9-18 - Robert Gove, Nick Gramsky, Rose Kirby, Emre Sefer, Awalin Sopan, Cody Dunne, Ben Shneiderman, Meirav Taieb-Maimon:
NetVisia: Heat Map & Matrix Visualization of Dynamic Social Network Statistics & Content. 19-26 - Krzysztof Juszczyszyn, Katarzyna Musial, Marcin Budka:
Link Prediction Based on Subgraph Evolution in Dynamic Social Networks. 27-34 - Nam P. Nguyen, Thang N. Dinh, Dung T. Nguyen, My T. Thai:
Overlapping Community Structures and Their Detection on Social Networks. 35-40 - Motahhare Eslami, Hamid R. Rabiee, Mostafa Salehi:
DNE: A Method for Extracting Cascaded Diffusion Networks from Social Networks. 41-48
Social Networks
- Justin Cheng, Daniel Mauricio Romero, Brendan Meeder, Jon M. Kleinberg:
Predicting Reciprocity in Social Networks. 49-56 - Enrique Frías-Martínez, Graham Williamson, Vanessa Frías-Martínez:
An Agent-Based Model of Epidemic Spread Using Human Mobility and Social Network Information. 57-64 - Greg Bigwood, Tristan Henderson:
IRONMAN: Using Social Networks to Add Incentives and Reputation to Opportunistic Networks. 65-72 - Michael Fire, Lena Tenenboim, Ofrit Lesser, Rami Puzis, Lior Rokach, Yuval Elovici:
Link Prediction in Social Networks Using Computationally Efficient Topological Features. 73-80 - Lu Han, Badri Nath, Liviu Iftode, S. Muthukrishnan:
Social Butterfly: Social Caches for Distributed Social Networks. 81-86
Gaming
- Derek L. Hansen, David W. Jacobs, Darcy Lewis, Arijit Biswas, Jennifer Preece, Dana Rotman, Eric Stevens:
Odd Leaf Out: Improving Visual Recognition with Games. 87-94 - Kan-Leung Cheng, Inon Zuckerman, Dana S. Nau, Jennifer Golbeck:
The Life Game: Cognitive Strategies for Repeated Stochastic Games. 95-102 - Eni Mustafaraj, Samantha Finn, Carolyn Whitlock, Panagiotis Takis Metaxas:
Vocal Minority Versus Silent Majority: Discovering the Opionions of the Long Tail. 103-110 - Jeon-Hyung Kang, Jihie Kim:
Analyzing Answers in Threaded Discussions Using a Role-Based Information Network. 111-117 - Kan-Leung Cheng, Ugur Kuter, Jennifer Golbeck:
Coevolving Strategies in Social-Elimination Games. 118-126 - Muhammad Aurangzeb Ahmad, Brian Keegan, Sophia D. Sullivan, Dmitri Williams, Jaideep Srivastava, Noshir S. Contractor:
Illicit Bits: Detecting and Analyzing Contraband Networks in Massively Multiplayer Online Games. 127-134 - Kyong Jin Shim, Kuo-Wei Hsu, Jaideep Srivastava:
An Exploratory Study of Player Performance, Motivation, and Enjoyment in Massively Multiplayer Online Role-Playing Games. 135-140 - Eunkyung Kim, Luyan Chi, Yu-Han Chang, Rajiv T. Maheswaran:
Dynamics of Social Interactions in a Network Game. 141-148
Prediction
- Jennifer Golbeck, Cristina Robles, Michon Edmondson, Karen Turner:
Predicting Personality from Twitter. 149-156 - Zoheb Borbora, Jaideep Srivastava, Kuo-Wei Hsu, Dmitri Williams:
Churn Prediction in MMORPGs Using Player Motivation Theories and an Ensemble Approach. 157-164 - Panagiotis Takis Metaxas, Eni Mustafaraj, Daniel Gayo-Avello:
How (Not) to Predict Elections. 165-171 - Mina Doroud, Prantik Bhattacharyya, Shyhtsun Felix Wu, Diane Felmlee:
The Evolution of Ego-Centric Triads: A Microscopic Approach toward Predicting Macroscopic Network Properties. 172-179 - Daniele Quercia, Michal Kosinski, David Stillwell, Jon Crowcroft:
Our Twitter Profiles, Our Selves: Predicting Personality with Twitter. 180-185 - Akshaya Iyengar, Tim Finin, Anupam Joshi:
Content-Based Prediction of Temporal Boundaries for Events in Twitter. 186-191 - Michael D. Conover, Bruno Gonçalves, Jacob Ratkiewicz, Alessandro Flammini, Filippo Menczer:
Predicting the Political Alignment of Twitter Users. 192-199
Social Search and Understanding
- Wei Pan, Nadav Aharony, Alex Pentland:
Fortune Monitor or Fortune Teller: Understanding the Connection between Interaction Patterns and Financial Status. 200-207 - Sai T. Moturu, Inas Khayal, Nadav Aharony, Wei Pan, Alex Pentland:
Using Social Sensing to Understand the Links between Sleep, Mood, and Sociability. 208-214 - Jeon-Hyung Kang, Kristina Lerman:
Leveraging User Diversity to Harvest Knowledge on the Social Web. 215-222 - Francesco Calabrese, Dominik Dahlem, Alexandre Gerber, DeDe Paul, Xiaoji Chen, James Rowland, Christopher Rath, Carlo Ratti:
The Connected States of America: Quantifying Social Radii of Influence. 223-230 - Yves-Alexandre de Montjoye, Jesika Haria, Manuel Cebrián, Alex Pentland:
The Need for Champions for Approximate Social Search. 231-234 - Koji Kamei, Tetsushi Ikeda, Hiroyuki Kidokoro, Masayuki Shiomi, Akira Utsumi, Kazuhiko Shinozawa, Takahiro Miyashita, Norihiro Hagita:
Effectiveness of Cooperative Customer Navigation from Robots around a Retail Shop. 235-241
Social Mining, Analysis, and Recommendation
- Enkh-Amgalan Baatarjav, Ram Dantu:
Unveiling Hidden Patterns to Find Social Relevance. 242-249 - Bjoern Elmar Macek, Martin Atzmueller, Gerd Stumme:
Profile Mining in CVS-Logs and Face-to-Face Contacts for Recommending Software Developers. 250-257 - Adrien Friggeri, Guillaume Chelius, Eric Fleury:
Triangles to Capture Social Cohesion. 258-265 - Carolin Kaiser, Alexander Piazza, Johannes Kröckel, Freimut Bodendorf:
Are Humans Like Ants? - Analyzing Collective Opinion Formation in Online Discussions. 266-273 - Baojun Qiu, Kang Zhao, Prasenjit Mitra, Dinghao Wu, Cornelia Caragea, John Yen, Greta E. Greer, Kenneth Portier:
Get Online Support, Feel Better - Sentiment Analysis and Dynamics in an Online Cancer Survivor Community. 274-281 - Amit Sharma, Dan Cosley:
Network-Centric Recommendation: Personalization with and in Social Networks. 282-289 - Marco Cristani, Giulia Paggetti, Alessandro Vinciarelli, Loris Bazzani, Gloria Menegaz, Vittorio Murino:
Towards Computational Proxemics: Inferring Social Relations from Interpersonal Distances. 290-297
Forum Analysis
- David I. Inouye, Jugal K. Kalita:
Comparing Twitter Summarization Algorithms for Multiple Post Summaries. 298-306 - Daniele Quercia, Jonathan Ellis, Licia Capra, Jon Crowcroft:
In the Mood for Being Influential on Twitter. 307-314 - Matthew Rowe, Sofia Angeletou, Harith Alani:
Anticipating Discussion Activity on Community Forums. 315-322 - Wei Cheng, Xiaochuan Ni, Jian-Tao Sun, Xiaoming Jin, Hye-Chung Kum, Xiang Zhang, Wei Wang:
Measuring Opinion Relevance in Latent Topic Space. 323-330 - David A. Huffaker, ChunYuen Teng, Matthew P. Simmons, Liuling Gong, Lada A. Adamic:
Group Membership and Diffusion in Virtual Worlds. 331-338 - Juan Lang, Shyhtsun Felix Wu:
Anti-preferential Attachment: If I Follow You, Will You Follow Me? 339-346 - Chih-Chun Chen, Camille Roth:
The Role of (Non-)Conformism in Rating Platforms. 347-353 - Eduarda Mendes Rodrigues, Natasa Milic-Frayling, Marc A. Smith, Ben Shneiderman, Derek L. Hansen:
Group-in-a-Box Layout for Multi-faceted Analysis of Communities. 354-361
Modeling
- Quang Duong, Michael P. Wellman, Satinder Singh:
Modeling Information Diffusion in Networks with Unobserved Links. 362-369 - Haifeng Zhao, William Kallander, Tometi Gbedema, Henric Johnson, Shyhtsun Felix Wu:
Read What You Trust: An Open Wiki Model Enhanced by Social Context. 370-379 - Noam Hazon, Nilanjan Chakraborty, Katia P. Sycara:
Game Theoretic Modeling and Computational Analysis of N-Player Conflicts over Resources. 380-387 - Krishna Yeswanth Kamath, James Caverlee:
Expert-Driven Topical Classification of Short Message Streams. 388-393 - Sergej Sizov:
RESCOT: Reliable Scheduling of Social Computing Tasks. 394-401 - Christoph Stadtfeld, Andreas Geyer-Schulz, Otto Allmendinger:
The Influence of Distance, Time, and Communication Network Structures on the Choice of Communication Partners. 402-409 - Cindy Hui, Malik Magdon-Ismail, William A. Wallace, Mark K. Goldberg:
Aborting a Message Flowing through Social Communities. 410-417
Trust, Reputation, and Privacy
- Thomas M. DuBois, Jennifer Golbeck, Aravind Srinivasan:
Predicting Trust and Distrust in Social Networks. 418-424 - Yuhong Liu, Yan Sun, Ting Yu:
Defending Multiple-User-Multiple-Target Attacks in Online Reputation Systems. 425-434 - Kevin McNally, Michael P. O'Mahony, Barry Smyth:
Models of Web Page Reputation in Social Search. 435-442 - Na Li, Nan Zhang, Sajal K. Das:
Relationship Privacy Preservation in Publishing Online Social Networks. 443-450 - Nicholas Violi, Jennifer Golbeck, Kan-Leung Cheng, Ugur Kuter:
Caretaker: A Social Game for Studying Trust Dynamics. 451-456 - Ho Keung Tsoi, Li Chen:
From Privacy Concern to Uses of Social Network Sites: A Cultural Comparison via User Survey. 457-464
SocialCom Poster Session
- Munmun De Choudhury:
Tie Formation on Twitter: Homophily and Structure of Egocentric Networks. 465-470 - Hideyuki Koto, Hajime Nakamura, Masaki Aida:
Two-Layered Structure of Social Network Revealed by Data Analysis of Telecommunciation Services. 471-476 - Paridhi Jain, Tiago Rodrigues, Gabriel Magno, Ponnurangam Kumaraguru, Virgílio A. F. Almeida:
Cross-Pollination of Information in Online Social Media: A Case Study on Popular Social Networks. 477-482 - David García, Frank Schweitzer:
Emotions in Product Reviews-Empirics and Models. 483-488 - Kazem Jahanbakhsh, Valerie King, Gholamali C. Shoja:
Empirical Comparison of Information Spreading Algorithms in the Presence of 1-Whiskers. 489-492 - Moonam Ko, Hakim Touati, Mohamed Shehab:
Enabling Cross-Site Content Sharing between Social Networks. 493-496 - Behnam Hajian, Tony White:
Modelling Influence in a Social Network: Metrics and Evaluation. 497-500 - Christopher B. Schenk, Douglas C. Sicker:
Finding Event-Specific Influencers in Dynamic Social Networks. 501-504 - Andrew Messenger, Jon Whittle:
Recommendations Based on User-Generated Comments in Social Media. 505-508 - Daqing Zhang, Zhu Wang, Bin Guo, Xingshe Zhou, Vaskar Raychoudhury:
A Dynamic Community Creation Mechanism in Opportunistic Mobile Social Networks. 509-514 - Santi Phithakkitnukoon, Francesco Calabrese, Zbigniew Smoreda, Carlo Ratti:
Out of Sight Out of Mind-How Our Mobile Social Network Changes during Migration. 515-520 - Abhijit Bendale, Kevin Chiu, Kshitij Marwah, Ramesh Raskar:
VisionBlocks: A Social Computer Vision Framework. 521-526 - Alvin Chin, Hao Wang, Bin Xu, Ke Zhang, Hao Wang, Lijun Zhu:
Connecting People in the Workplace through Ephemeral Social Networks. 527-530 - Charalampos Chelmis, Viktor K. Prasanna:
Social Networking Analysis: A State of the Art and the Effect of Semantics. 531-536 - Jerzy Surma, Anna Furmanek:
Data Mining in On-Line Social Network for Marketing Response Analysis. 537-540 - Alana Platt, Cynthia Hood, Levi Citrin:
From Earthquakes to "#morecowbell": Identifying Sub-topics in Social Network Communications. 541-544 - Jung Sun Oh, Wei Jeng:
Groups in Academic Social Networking Services-An Exploration of Their Potential as a Platform for Multi-disciplinary Collaboration. 545-548 - Udayan Khurana, Viet-An Nguyen, Hsueh-Chien Cheng, Jae-wook Ahn, Xi Stephen Chen, Ben Shneiderman:
Visual Analysis of Temporal Trends in Social Networks Using Edge Color Coding and Metric Timelines. 549-554 - Daniel S. Farenzena, Ricardo M. Araujo, Luís C. Lamb:
Collaboration Emergence in Social Networks with Informational Natural Selection. 555-559 - Fa-Hsien Li, Cheng-Te Li, Man-Kwan Shan:
Labeled Influence Maximization in Social Networks for Target Marketing. 560-563 - Whitman Richards:
Social Network Models. 564-567 - Xiaoling Sun, Jasleen Kaur, Lino Possamai, Filippo Menczer:
Detecting Ambiguous Author Names in Crowdsourced Scholarly Data. 568-571 - Liu Yang, Vinod Ganapathy, Liviu Iftode:
Enhancing Mobile Malware Detection with Social Collaboration. 572-576 - Rushed Kanawati:
LICOD: Leaders Identification for Community Detection in Complex Networks. 577-582 - Sava Stakic, Srdjan Stakic:
Design Issues in Minimizing Infrastructure Requirements of Mobile Social Software Introduction System. 583-586 - Keren Jin, Jiafeng Zhu, Guangbin Fan:
MET: Multi-party E-Commerce Transaction Model. 587-590 - Eve Powell, Felesia Stukes, Tiffany Barnes, Heather Richter Lipford:
Snag'em: Creating Community Connections through Games. 591-594 - Byoungoh Kim, Gonzalo Huerta Cánepa, Dongman Lee:
Urban Radar: An Enabler for Place-Aware Spontaneous Interactions. 595-598 - Fadoua Ouamani, Narjès Bellamine Ben Saoud, Henda Hajjami Ben Ghézala:
Towards a Generic Socio-cultural Profile for Collaborative Environments. 599-602 - Xuning Tang, Christopher C. Yang:
Dynamic Community Detection with Temporal Dirichlet Process. 603-608 - João Laranjeira, Goreti Marreiros, Carlos Filipe Freitas, Ricardo Santos, João Carneiro, Carlos Ramos:
A Proposed Model to Include Social and Emotional Context in a Group Idea Generation Support System. 609-612 - Juan Lorenzo Hagad, Roberto Sebastian Legaspi, Masayuki Numao, Merlin Suarez:
Predicting Levels of Rapport in Dyadic Interactions through Automatic Detection of Posture and Posture Congruence. 613-616 - Kyong Jin Shim, Kuo-Wei Hsu, Samarth Damania, Colin DeLong, Jaideep Srivastava:
An Exploratory Study of Player and Team Performance in Multiplayer First-Person-Shooter Games. 617-620 - Chamari Priyange Edirisinghe, Adrian David Cheok, Ryohei Nakatsu, Johannes Widodo:
Exploring the Spatiality of Networked Social Media as the Third Space. 621-624 - Vincent A. Traag, Arnaud Browet, Francesco Calabrese, Frédéric Morlot:
Social Event Detection in Massive Mobile Phone Data Using Probabilistic Location Inference. 625-628 - Iftekhar Ahmed, Channing Brown, Andrew Pilny, Y. Dora Cai, Yannick Atouba Ada, Marshall Scott Poole:
Identification of Groups in Online Environments: The Twist and Turns of Grouping Groups. 629-632 - Zinovia I. Alepidou, Konstantinos N. Vavliakis, Pericles A. Mitkas:
A Semantic Tag Recommendation Framework for Collaborative Tagging Systems. 633-636 - Lily Tran, Manuel Cebrián, Coco Krumme, Alex Pentland:
Social Distance Drives the Convergence of Preferences in an Online Music Sharing Network. 637-640 - Michael Brennan, Rachel Greenstadt:
Coalescing Twitter Trends: The Under-Utilization of Machine Learning in Social Media. 641-646 - Nisheeth Srivastava, Paul R. Schrater:
Cognitive Efficiency as a Causal Mechanism for Social Preferences. 647-650 - Justus F. M. Broß, Patrick Schilf, Maximilian Jenders, Christoph Meinel:
Visualizing the Blogosphere with BlogConnect. 651-656 - Pramod Divakarmurthy, Pooja Biswas, Ronaldo Menezes:
A Temporal Analysis of Geographical Distances in Computer Science Collaborations. 657-660 - Karthik Subbian, Prem Melville:
Supervised Rank Aggregation for Predicting Influencers in Twitter. 661-665 - Siddhartha Bhattacharyya, Stellan Ohlsson:
How Network Structure Affects Social Creativity. 666-671 - Philipp Berger, Patrick Hennig, Justus Bross, Christoph Meinel:
Mapping the Blogosphere-Towards a Universal and Scalable Blog-Crawler. 672-677 - Anneli Avatare Nöu, Marie Sjölinder:
Live Broadcasting-The Feeling of Presence and Social Interaction. 678-683 - Shaun Lichter, Terry L. Friesz, Christopher Griffin:
Link Bias in Network Formation Games. 684-687 - Justin Zhan, Nadia M. Jones, Michael D. Purnell:
Top-K Algorithm for Recommendation in Social Networking Kingdoms. 688-694 - Justin Zhan, Xing Fang:
Anomaly Detection in Social-Economic Computing. 695-703 - Su Yang, Wenbin Zhou:
Anomaly Detection on Collective Moving Patterns: Manifold Learning Based Analysis of Traffic Streams. 704-707 - Hyung-Jun Yim, Yun-Young Hwang, Kyu-Chul Lee:
Task-Based Services Composition for Ubiquitous Computing. 708-711 - Derek Foster, Ben Kirman, Conor Linehan, Shaun W. Lawson, Daniel Mills, Sarah Ellis, Helen Zulch:
"I Can Haz Emoshuns?"-Understanding Anthropomorphosis of Cats among Internet Users. 712-715 - Kshanti A. Greene, Dan Thomsen, Pietro Michelucci:
Exploration in Massively Collaborative Problem Solving. 716-719 - Tiffany Ng, Ou Jie Zhao, Dan Cosley:
pieTime: Visualizing Communication Patterns. 720-723 - Róbert Sumi, Taha Yasseri, András Rung, András Kornai, János Kertész:
Edit Wars in Wikipedia. 724-727 - Liyue Zhao, Gita Sukthankar, Rahul Sukthankar:
Incremental Relabeling for Active Learning with Noisy Crowdsourced Annotations. 728-733 - Thomas Clay Templeton, Kenneth R. Fleischmann, Jordan L. Boyd-Graber:
Simulating Audiences: Automating Analysis of Values, Attitudes, and Sentiment. 734-737 - Christiane Moser, Verena Fuchsberger, Katja Neureiter, Wolfgang Sellner, Manfred Tscheligi:
Elderly's Social Presence Supported by ICTs: Investigating User Requirements for Social Presence. 738-741 - Georg Groh, Christoph Fuchs, Alexander Lehmann:
Combining Evidence for Social Situation Detection. 742-747 - Eunice E. Santos, Eugene Santos Jr., John Korah, Jeremy E. Thompson, Keum Joo Kim, Riya George, Qi Gu, Jacob C. Jurmain, Suresh Subramanian, John Thomas Wilkinson:
Intent-Driven Behavioral Modeling during Cross-Border Epidemics. 748-755 - Malik Magdon-Ismail, Jonathan T. Purnell:
SSDE-Cluster: Fast Overlapping Clustering of Networks Using Sampled Spectral Distance Embedding and GMMs. 756-759 - Nicholas Violi, Ben Shneiderman, Art Hanson, P. J. Rey:
Motivation for Participation in Online Neighborhood Watch Communities: An Empirical Study Involving Invitation Letters. 760-765 - Man-Ching Yuen, Irwin King, Kwong-Sak Leung:
A Survey of Crowdsourcing Systems. 766-773 - Christopher C. Yang, Xuning Tang, Jia Huang, Jennifer B. Unger:
A Study of Social Interactions in Online Health Communities. 774-779 - Mark K. Goldberg, Malik Magdon-Ismail, Srinivas Nambirajan, James Thompson:
Tracking and Predicting Evolution of Social Communities. 780-783 - Gundeep Singh Bindra:
Masquerading as a Trustworthy Entity through Portable Document File (PDF) Format. 784-789 - Jan Hauffa, Gottlieb Bossert, Nadja Richter, Florian Wolf, Nora Liesenfeld, Georg Groh:
Beyond FOAF: Challenges in Characterizing Social Relations. 790-795 - Chjan C. Lim:
Rational Choice and Barriers to Exponential Complexity in Social Optimization Computations under Uncertainty. 796-799 - Yiftach Nagar:
Beyond the Human-Computation Metaphor. 800-805 - Taehyun Kim, Gonzalo Huerta Cánepa, Jongheon Park, Soon J. Hyun, Dongman Lee:
What's Happening: Finding Spontaneous User Clusters Nearby Using Twitter. 806-809 - Irena Pletikosa Cvijikj, Erica Dubach Spiegler, Florian Michahelles:
The Effect of Post Type, Category and Posting Day on User Interaction Level on Facebook. 810-813 - Tomoaki Akitomi, Koji Ara, Jun-ichiro Watanabe, Kazuo Yano:
Generic Model of Activity-Level in Workplace Communication. 814-819 - Jenq-Haur Wang, Chi-Ching Lee:
Unsupervised Opinion Phrase Extraction and Rating in Chinese Blog Posts. 820-823 - Xi Wang, Gita Sukthankar:
Extracting Social Dimensions Using Fiedler Embedding. 824-829 - Alexei Sharpanskykh, Jan Treur:
Group Abstraction for Large-Scale Agent-Based Social Diffusion Models. 830-837 - Swarup Chandra, Latifur Khan, Fahad Bin Muhaya:
Estimating Twitter User Location Using Social Interactions-A Content Based Approach. 838-843 - Zhenmei Liao, Su Yang, Jianning Liang:
Discovering Collective Mobility Patterns. 844-847 - Alexei Sharpanskykh, Brian R. Spisak:
An Agent-Based Evolutionary Model of Leadership. 848-855 - Georg Groh, Stefan Birnkammerer:
Privacy and Information Markets: Controlling Information Flows in Decentralized Social Networking. 856-861 - Po-Wah Yau, Allan Tomlinson:
Towards Privacy in a Context-Aware Social Network Based Recommendation System. 862-865 - Lizzie Coles-Kemp, Elahe Kani-Zabihi:
Practice Makes Perfect: Motivating Confident Privacy Protection Practices. 866-871 - Stefano Braghin, Vincenzo Iovino, Giuseppe Persiano, Alberto Trombetta:
Secure and Policy-Private Resource Sharing in an Online Social Network. 872-875 - Piotr Kozikowski, Georg Groh:
Inferring Profile Elements from Publicly Available Social Network Data. 876-881 - Muhammad Aurangzeb Ahmad, Iftekhar Ahmed, Jaideep Srivastava, Marshall Scott Poole:
Trust Me, I'm an Expert: Trust, Homophily and Expertise in MMOs. 882-887 - Thang N. Dinh, My T. Thai:
Finding Community Structure with Performance Guarantees in Scale-Free Networks. 888-891 - Daniel Compton, J. A. Hamilton Jr.:
An Examination of the Techniques and Implications of the Crowd-Sourced Collection of Forensic Data. 892-895 - Jacopo Staiano, Bruno Lepri, Kyriaki Kalimeri, Nicu Sebe, Fabio Pianesi:
Contextual Modeling of Personality States' Dynamics in Face-to-Face Interactions. 896-899 - Pierre St. Juste, David Wolinsky, P. Oscar Boykin, Renato J. O. Figueiredo:
Litter: A Lightweight Peer-to-Peer Microblogging Service. 900-903 - Amit Rechavi, Sheizaf Rafaeli:
Not All Is Gold That Glitters: Response Time & Satisfaction Rates in Yahoo! Answers. 904-909 - Scott Piao, Jon Whittle:
A Feasibility Study on Extracting Twitter Users' Interests Using NLP Tools for Serendipitous Connections. 910-915
PASSAT 2011
Privacy
- Jannik Dreier, Florian Kerschbaum:
Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation. 916-924 - Marina Blanton:
Achieving Full Security in Privacy-Preserving Data Mining. 925-934 - Bastian Könings, David Piendl, Florian Schaub, Michael Weber:
PrivacyJudge: Effective Privacy Controls for Online Published Information. 935-941 - Yang Wang, Armen Aghasaryan, Arvind Shrihari, David Pergament, Guy-Bertrand Kamga, Stéphane Betgé-Brezetz:
Intelligent Reactive Access Control for Moving User Data. 942-950 - Yuan Hong, Jaideep Vaidya, Haibing Lu, Basit Shafiq:
Privacy-Preserving Tabu Search for Distributed Graph Coloring. 951-958 - Madan Oberoi, Pramod Jagtap, Anupam Joshi, Tim Finin, Lalana Kagal:
Information Integration and Analysis: A Semantic Approach to Privacy. 959-965 - Dennis G. Kafura, Denis Gracanin, Manuel A. Pérez-Quiñones, Tom DeHart, Sherley Codio:
An Approach to Community-Oriented Email Privacy. 966-973 - Prima Chairunnanda, Nam Pham, Urs Hengartner:
Privacy: Gone with the Typing! Identifying Web Users by Their Typing Patterns. 974-980 - Mehmet Sayal, Lisa Singh:
Privately Detecting Pairwise Correlations in Distributed Time Series. 981-987 - Barbara Carminati, Elena Ferrari, Michele Guglielmi:
Secure Information Sharing on Support of Emergency Management. 988-995 - Pawel Jurczyk, Li Xiong:
Information Sharing across Private Databases: Secure Union Revisited. 996-1003
Trust and Risk
- Kevin Xuhua Ouyang, Binod Vaidya, Dimitrios Makrakis:
A Probabilistic-Based Trust Evaluation Model Using Hidden Markov Models and Bonus Malus Systems. 1004-1011 - Billy Lau, Atul Prakash, Venkatanathan Annamalai:
Accessing Trusted Web Sites from Low-Integrity Systems without End-Host Snooping. 1012-1019 - Katharine Chang, Xinwen Zhang, Guoqiang Wang, Kang G. Shin:
TGIS: Booting Trust for Secure Information Sharing in Dynamic Group Collaborations. 1020-1025
Security
- Sujit Sanjeev, Jatin Lodhia, Raghunathan Srinivasan, Partha Dasgupta:
Protecting Cryptographic Keys on Client Platforms Using Virtualization and Raw Disk Image Access. 1026-1032 - Giovanni Russello, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich:
YAASE: Yet Another Android Security Extension. 1033-1040 - Markus Gruber, Florian Fankhauser, Stefan Taber, Christian Schanes, Thomas Grechenig:
Security Status of VoIP Based on the Observation of Real-World Attacks on a Honeynet. 1041-1047 - Raghunathan Srinivasan, Partha Dasgupta, Tushar Gohad:
Software Based Remote Attestation for OS Kernel and User Applications. 1048-1055 - Belal Amro, Albert Levi, Yücel Saygin:
CoRPPS: Collusion Resistant Pseudonym Providing System. 1056-1063 - Dipankar Dasgupta, Md. Moshiur Rahman:
Estimating Security Coverage for Cloud Services. 1064-1071
Web Assurance
- Joe Pato, Sharon Paradesi, Ian Jacobi, Fuming Shih, Sam Wang:
Aintno: Demonstration of Information Accountability on the Web. 1072-1080 - Anna Cinzia Squicciarini, Christopher Griffin, Smitha Sundareswaran:
Towards a Game Theoretical Model for Identity Validation in Social Network Sites. 1081-1088 - Lei Liu, Xinwen Zhang, Songqing Chen:
Botnet with Browser Extensions. 1089-1094 - Nidal Khoury, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
An Analysis of Black-Box Web Application Security Scanners against Stored SQL Injection. 1095-1101 - Pallabi Parveen, Jonathan Evans, Bhavani Thuraisingham, Kevin W. Hamlen, Latifur Khan:
Insider Threat Detection Using Stream Mining and Graph Mining. 1102-1110 - Frédéric Prost:
Enforcing Dynamic Interference Policy. 1111-1118 - Ibidokun Emmanuel Tope, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Performance and Scalability Evaluation of Oracle VM Server Software Virtualization in a 64 Bit Linux Environment. 1119-1124 - Ayodele Oluwaseun Ibidapo, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:
An Analysis of CVSS v2 Environmental Scoring. 1125-1130 - Yikan Chen, David Evans:
Auditing Information Leakage for Distance Metrics. 1131-1140
PASSAT Poster Session
- Reza Samavi, Mariano P. Consens, Thodoros Topaloglou:
Privacy Goals and Settings Mediator Model for PHRs. 1141-1146 - Hagen Stübing, Marco Pfalzgraf, Sorin A. Huss:
A Decentralized Group Privacy Protocol for Vehicular Networks. 1147-1154 - Pauline Anthonysamy, Awais Rashid, Phil Greenwood:
Do the Privacy Policies Reflect the Privacy Controls on Social Networks? 1155-1158 - Amir Herzberg, Ely Porat, Nir Soffer, Erez Waisbard:
Camouflaged Private Communication. 1159-1162 - Justin Zhan, Luis Cabrera, Gasim Osman, Ronak Shah:
Using Private Matching for Securely Querying Genomic Sequences. 1163-1168 - Ayan Acharya, Eduardo R. Hruschka, Joydeep Ghosh:
A Privacy-Aware Bayesian Approach for Combining Classifier and Cluster Ensembles. 1169-1172 - Delfina Malandrino, Vittorio Scarano:
Supportive, Comprehensive and Improved Privacy Protection for Web Browsing. 1173-1176 - Dalal Ahmed Al-Arayed, João Pedro Sousa:
TISS-loc: Towards User Control of Privacy in Location Disclosure. 1177-1184 - Marina Blanton, Yihua Zhang, Keith B. Frikken:
Secure and Verifiable Outsourcing of Large-Scale Biometric Computations. 1185-1191 - Mozhgan Tavakolifard:
Conditional Trust Adjustment and Initialization. 1192-1195 - Wagner Medeiros dos Santos, Ruy J. G. B. de Queiroz:
Preserving Vote Secrecy in End-to-End Verifiable Voting Systems. 1196-1201 - Sandeep Varma Nadimpalli, Valli Kumari Vatsavayi:
BM (Break-Merge): An Elegant Approach for Privacy Preserving Data Publishing. 1202-1207 - Shan Chen, Mary-Anne Williams:
An Ontological Study of Data Purpose for Privacy Policy Enforcement. 1208-1213 - Nihel Ben Youssef, Adel Bouhoula:
Systematic Deployment of Network Security Policy in Centralized and Distributed Firewalls. 1214-1219 - Siew Yong, Dale Lindskog, Ron Ruhl, Pavol Zavarsky:
Risk Mitigation Strategies for Mobile Wi-Fi Robot Toys from Online Pedophiles. 1220-1223 - Wei Jiang, Bharath K. Samanthula:
A Secure and Distributed Framework to Identify and Share Needed Information. 1224-1230 - Wolfgang Boehmer:
Dynamic Systems Approach to Analyzing Event Risks and Behavioral Risks with Game Theory. 1231-1238 - Hidehito Gomi:
Access Control Model and Design for Delegation Using Authorization Tokens. 1239-1242 - Hiroyuki Sato:
A New Formula of Security Risk Analysis That Takes Risk Improvement Factor into Account. 1243-1248 - Faisal T. Ammari, Joan Lu, Maher Abur-rous:
Intelligent XML Tag Classification Techniques for XML Encryption Improvement. 1249-1252 - Amer Aljaedi, Dale Lindskog, Pavol Zavarsky, Ron Ruhl, Fares Almari:
Comparative Analysis of Volatile Memory Forensics: Live Response vs. Memory Imaging. 1253-1258 - Narges Shahgholi, Mehran Mohsenzadeh, Mir Ali Seyyedi, Saleh Hafez Qorani:
A New SOA Security Framework Defending Web Services against WSDL Attacks. 1259-1262 - Bonnie Zhu, Shankar Sastry:
Revisit Dynamic ARIMA Based Anomaly Detection. 1263-1268 - Boyan Chen, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
A Study of the Effectiveness of CSRF Guard. 1269-1272 - David C. Edwards, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Shaun Aghili:
E-Government System Security Model (eGSSM): A Multidimensional, Risk Based Approach to E-Government. 1273-1277 - Xun Wang, Mary-Anne Williams:
Risk, Uncertainty and Possible Worlds. 1278-1283 - Justin Zhan, Xing Fang:
A Novel Trust Computing System for Social Networks. 1284-1289 - Yung-Yu Chang, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:
Trend Analysis of the CVE for Software Vulnerability Management. 1290-1293
Workshop on Security and Privacy in Social Networks (SPSN 2011)
- Hye-Chung Kum, Stanley C. Ahalt:
Decoupled Data for Privacy Preserving Record Linkage with Error Management. 1294-1301 - Oleksandr Bodriagov, Sonja Buchegger:
Encryption for Peer-to-Peer Social Networks. 1302-1309 - Patrik Bichsel, Jan Camenisch, Mario Verdicchio:
Recognizing Your Digital Friends. 1310-1313 - Christopher G. Harris:
Dirty Deeds Done Dirt Cheap: A Darker Side to Crowdsourcing. 1314-1317 - Fergal Reid, Martin Harrigan:
An Analysis of Anonymity in the Bitcoin System. 1318-1326 - Michael Netter, Sebastian Herbst, Günther Pernul:
Analyzing Privacy in Social Networks-An Interdisciplinary Approach. 1327-1334 - Muhammad Adeel, Laurissa N. Tokarchuk:
Analysis of Mobile P2P Malware Detection Framework through Cabir & Commwarrior Families. 1335-1343 - Ki Jung Lee, Il-Yeol Song:
Modeling and Analyzing User Behavior of Privacy Management on Online Social Network: Research in Progress. 1344-1351 - Ahmad Kamran Malik, Schahram Dustdar:
Sharing and Privacy-Aware RBAC in Online Social Networks. 1352-1355
Workshop on Modeling Social Media, User Interface Modeling in Social Media (MSM 2011)
- Florian Lemmerich, Martin Atzmueller:
Modeling Location-Based Profiles of Social Image Media Using Explorative Pattern Mining. 1356-1363 - Mohamed Bourimi, Ricardo Tesoriero, Pedro González Villanueva, Fatih Karatas, Philipp Schwarte:
Privacy and Security in Multi-modal User Interface Modeling for Social Media. 1364-1371 - Elenna R. Dugundji, Ate Poorthuis, Michiel van Meeteren:
Modeling User Behavior in Adoption and Diffusion of Twitter Clients. 1372-1379 - Victoria Lai, Christopher Rajashekar, William Rand:
Comparing Social Tags to Microblogs. 1380-1383 - Enkh-Amgalan Baatarjav, Ram Dantu:
Current and Future Trends in Social Media. 1384-1385 - Hesham Allam, James Blustein, Louise Spiteri, Michael Bliemel:
Enhancing Exploratory Search with Hedonic Browsing Using Social Tagging Tools. 1386-1389 - Else Nygren:
Simulation of User Participation and Interaction in Online Discussion Groups. 1390-1397
Workshop on Social Object Networks (SON 2011)
- David De Roure, Sean Bechhofer, Carole A. Goble, David R. Newman:
Scientific Social Objects: The Social Objects and Multidimensional Network of the myExperiment Website. 1398-1402 - Lei Li, Tong Sun, Tao Li:
Personal Social Screen-A Dynamic Privacy Assignment System for Social Sharing in Complex Social Object Networks. 1403-1408 - Dan Chalmers, Simon Fleming, Ian Wakeman, Des Watson:
Rhythms in Twitter. 1409-1414 - Nicolas Marie, Fabien Gandon:
Social Objects Description and Recommendation in Multidimensional Social Networks: OCSO Ontology and Semantic Spreading Activation. 1415-1420 - Teshome Feyessa, Marwan Bikdash, Gary L. Lebby:
Node-Pair Feature Extraction for Link Prediction. 1421-1424
Workshop on Social Connections in the Urban Space (SCUS 2011)
- Thomas Couronné, Ana-Maria Olteanu-Raimond, Zbigniew Smoreda:
Urban Mobility: Velocity and Uncertainty in Mobile Phone Data. 1425-1430 - Hiroaki Sengoku, Yuki Akiyama, Ryosuke Shibasaki:
Time-Series Monitoring Method of Commercial Accumulations Using Digital Yellow Page Data. 1431-1436 - David Boardman, Federico Casalegno, Steve Pomeroy:
Locast Civic Media: Extending Civic Engagement Boundaries through Mobile Media and Hyper-Local Conversations. 1437-1442 - Kyungsik Han, Eric A. Graham, Dylan Vassallo, Deborah Estrin:
Enhancing Motivation in a Mobile Participatory Sensing Project through Gaming. 1443-1448 - Ciaran Owens, Stephen A. Brewster:
Discovering and Classifying Errors in Way Finding. 1449-1454 - Armando Bazzani, Bruno Giorgini, Riccardo Gallotti, Luca Giovannini, Monica Marchioni, Sandro Rambaldi:
Towards Congestion Detection in Transportation Networks Using GPS Data. 1455-1459
Workshop on Social Behavioral Analysis and Behavioral Change (SBABC 2011)
- Sebastian Feese, Amir Muaremi, Bert Arnrich, Gerhard Tröster, Bertolt Meyer, Klaus Jonas:
Discriminating Individually Considerate and Authoritarian Leaders by Speech Activity Cues. 1460-1465 - Giovanna Varni, Gualtiero Volpe, Barbara Mazzarino:
Towards a Social Retrieval of Music Content. 1466-1473 - Masaru Honjo, Toru Hasegawa, Teruyuki Hasegawa, Koji Mishima, Tatsuya Suda, Toshikazu Yoshida:
A Framework to Identify Relationships among Students in School Bullying Using Digital Communication Media. 1474-1479 - Hikaru Yamamoto, Naohiro Matsumura:
The Effect of Relational Context on Personal Influence. 1480-1485 - Marco Guerini, Carlo Strapparava:
Persuasion and Social Contagion. 1486-1489
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.