


Остановите войну!
for scientists:


default search action
SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013: Washington, DC, USA
- International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5137-1
- Arcot Rajasekar, Sharlini Sankaran
, Howard Lander, Thomas M. Carsey, Jonathan David Crabtree, Hye-Chung Kum, Mercè Crosas, Gary King, Justin Zhan:
Sociometric Methods for Relevancy Analysis of Long Tail Science Data. 1-6 - Varun Sharma, Jeremy Carroll, Abhi Khune:
Scaling Deep Social Feeds at Pinterest. 7-12 - Nyunsu Kim, Sukru Tikves, Zheng Wang, Jonathan Githens-Mazer, Hasan Davulcu:
MultiScale Modeling of Islamic Organizations in UK. 13-18 - Sujoy Sikdar, Byungkyu Kang, John O'Donovan, Tobias Höllerer, Sibel Adali:
Understanding Information Credibility on Twitter. 19-24 - Amogh Mahapatra, Jaideep Srivastava
:
Incongruity Versus Incongruity Resolution. 25-32 - Jason Tsai, Yundi Qian, Yevgeniy Vorobeychik
, Christopher Kiekintveld, Milind Tambe:
Bayesian Security Games for Controlling Contagion. 33-38 - Federica Giummolè
, Salvatore Orlando
, Gabriele Tolomei
:
Trending Topics on Twitter Improve the Prediction of Google Hot Queries. 39-44 - Fatih Kocak, George Kesidis, Tuan-Minh Pham
, Serge Fdida:
The Effect of Caching on a Model of Content and Access Provider Revenues in Information-centric Networks. 45-50 - Kuzman Katkalov, Kurt Stenzel, Marian Borek, Wolfgang Reif
:
Model-Driven Development of Information Flow-Secure Systems with IFlow. 51-56 - Delfina Malandrino
, Vittorio Scarano
, Raffaele Spinelli:
How Increased Awareness Can Impact Attitudes and Behaviors toward Online Privacy Protection. 57-62 - Tad Hogg, Kristina Lerman, Laura M. Smith:
Using Stochastic Models to Predict User Response in Social Media. 63-68 - Amy X. Zhang, Anastasios Noulas, Salvatore Scellato, Cecilia Mascolo:
Hoodsquare: Modeling and Recommending Neighborhoods in Location-Based Social Networks. 69-74 - Chloë Brown
, Anastasios Noulas, Cecilia Mascolo, Vincent D. Blondel:
A Place-Focused Model for Social Networks in Cities. 75-80 - Victoria Lai, William Rand
:
Does Love Change on Twitter? The Dynamics of Topical Conversations in Microblogging. 81-86 - Akshay Patil, Golnaz Ghasemiesfeh, Roozbeh Ebrahimi, Jie Gao:
Quantifying Social Influence in Epinions. 87-92 - Nibir Bora, Vladimir Zaytsev, Yu-Han Chang, Rajiv T. Maheswaran:
Gang Networks, Neighborhoods and Holidays: Spatiotemporal Patterns in Social Media. 93-101 - David Darmon, Jared Sylvester, Michelle Girvan, William Rand
:
Predictability of User Behavior in Social Media: Bottom-Up v. Top-Down Modeling. 102-107 - Khalid Zaman Bijon, Ram Krishnan
, Ravi S. Sandhu:
Towards an Attribute Based Constraints Specification Language. 108-113 - Hongwei Tian, Weining Zhang:
Privacy-Preserving Data Publishing Based on Utility Specification. 114-121 - Mingming Chen, Tommy Nguyen, Boleslaw K. Szymanski
:
On Measuring the Quality of a Network Community Structure. 122-127 - Muhammad Asif Hossain Khan, Danushka Bollegala, Guangwen Liu, Kaoru Sezaki:
Multi-tweet Summarization of Real-Time Events. 128-133 - Noseong Park, Michael Ovelgönne, V. S. Subrahmanian:
SMAC: Subgraph Matching and Centrality in Huge Social Networks. 134-141 - Claudiu Cristian Musat, Boi Faltings, Philippe Rousille:
Direct Negative Opinions in Online Discussions. 142-147 - Zahy Bnaya, Rami Puzis
, Roni Stern
, Ariel Felner
:
Bandit Algorithms for Social Network Queries. 148-153 - Hao Xu, Zhenwen Wang, Weidong Xiao:
Analyzing Community Core Evolution in Mobile Social Networks. 154-161 - Jianping He, David J. Miller, George Kesidis:
Latent Interest-Group Discovery and Management by Peer-to-Peer Online Social Networks. 162-167 - Sedat Gokalp, M'hamed H. Temkit, Hasan Davulcu, Ismail Hakki Toroslu
:
Partitioning and Scaling Signed Bipartite Graphs for Polarized Political Blogosphere. 168-173 - Vivek K. Singh, Laura J. Freeman, Bruno Lepri, Alex Pentland:
Predicting Spending Behavior Using Socio-mobile Features. 174-179 - Tanmoy Chakraborty
, Srijan Kumar, M. Dastagiri Reddy, Suhansanu Kumar, Niloy Ganguly
, Animesh Mukherjee:
Automatic Classification and Analysis of Interdisciplinary Fields in Computer Sciences. 180-187 - Bogdan Vasilescu
, Vladimir Filkov, Alexander Serebrenik
:
StackOverflow and GitHub: Associations between Software Development and Crowdsourced Knowledge. 188-195 - Ying Chen, Sencun Zhu, Heng Xu, Yilu Zhou:
Children's Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness. 196-203 - Konstantin Kuzmin
, S. Yousaf Shah, Boleslaw K. Szymanski
:
Parallel Overlapping Community Detection with SLPA. 204-212 - Liliya I. Besaleva, Alfred C. Weaver
:
Applications of Social Networks and Crowdsourcing for Disaster Management Improvement. 213-219 - Tobias Baur
, Ionut Damian, Patrick Gebhard, Kaska Porayska-Pomsta, Elisabeth André
:
A Job Interview Simulation: Social Cue-Based Interaction with a Virtual Character. 220-227 - Suman Kalyan Maity, Abhishek Porwal, Animesh Mukherjee:
Understanding How Learning Affects Agreement Process in Social Networks. 228-235 - Laura M. Smith, Linhong Zhu, Kristina Lerman, Zornitsa Kozareva:
The Role of Social Media in the Discussion of Controversial Topics. 236-243 - Nathaniel Dykhuis, Paul R. Cohen, Yu-Han Chang:
Simulating Team Formation in Social Networks. 244-253 - Ahmed Abbasi, Tianjun Fu, Daniel Zeng, Donald A. Adjeroh:
Crawling Credible Online Medical Sentiments for Social Intelligence. 254-263 - Mostafa Karamibekr, Ali A. Ghorbani:
A Structure for Opinion in Social Domains. 264-271 - Giacomo Inches, Morgan Harvey
, Fabio Crestani
:
Finding Participants in a Chat: Authorship Attribution for Conversational Documents. 272-279 - Anisha Mazumder, Arun Das
, Nyunsu Kim, Sedat Gokalp, Arunabha Sen, Hasan Davulcu:
Spatio-temporal Signal Recovery from Political Tweets in Indonesia. 280-287 - Mahendra Piraveenan, Shahadat Uddin
, Gnana Thedchanamoorthy
:
Effect of Vaccination Strategies on the Herd Immunity of Growing Networks. 288-294 - Jessica Staddon, Alessandro Acquisti
, Kristen LeFevre:
Self-Reported Social Network Behavior: Accuracy Predictors and Implications for the Privacy Paradox. 295-302 - Claudia Wagner, Sitaram Asur, Joshua M. Hailpern:
Religious Politicians and Creative Photographers: Automatic User Categorization in Twitter. 303-310 - Clayton Fink, Nathan Bos, Alexander Perrone, Edwina Liu, Jonathon Kopecky:
Twitter, Public Opinion, and the 2011 Nigerian Presidential Election. 311-320 - Oded Green, David A. Bader
:
Faster Clustering Coefficient Using Vertex Covers. 321-330 - Akshay Patil, Juan Liu, Jianqiang Shen, Oliver Brdiczka, Jie Gao, John Hanley:
Modeling Attrition in Organizations from Email Communication. 331-338 - Olga Peled, Michael Fire, Lior Rokach, Yuval Elovici:
Entity Matching in Online Social Networks. 339-344 - Marina Boia, Boi Faltings, Claudiu Cristian Musat, Pearl Pu:
A : ) Is Worth a Thousand Words: How People Attach Sentiment to Emoticons and Words in Tweets. 345-350 - Maryam Fatemi, Laurissa N. Tokarchuk:
A Community Based Social Recommender System for Individuals & Groups. 351-356 - Ammar Hassan, Ahmed Abbasi, Daniel Zeng:
Twitter Sentiment Analysis: A Bootstrap Ensemble Framework. 357-364 - Patrick Hennig, Philipp Berger, Christoph Meinel, Maria Graber, Jens Hildebrandt, Stefan Lehmann, Cathleen Ramson:
Tracking Visitor Engagement in the Blogosphere for Leveraging Rankings. 365-372 - Grant Stafford, Louis Lei Yu:
An Evaluation of the Effect of Spam on Twitter Trending Topics. 373-378 - Kuan-Hsi Chen, Tyne Liang:
Friendship Prediction on Social Network Users. 379-384 - Haifeng Liu, Zheng Hu, Dian Zhou, Hui Tian:
Cumulative Probability Distribution Model for Evaluating User Behavior Prediction Algorithms. 385-390 - Germán Creamer, Yong Ren, Yasuaki Sakamoto, Jeffrey V. Nickerson
:
News and Sentiment Analysis of the European Market with a Hybrid Expert Weighting Algorithm. 391-396 - Marcello Tomasini
, Franco Zambonelli
, Angelo Brayner
, Ronaldo Menezes
:
Evaluating the Performance of Social Networks of Sensors under Different Mobility Models. 397-402 - Vaskar Raychoudhury, Ajay D. Kshemkalyani, Daqing Zhang, Jiannong Cao
, Mohit Bakshi, Kanik Gupta, Vishal Mittal, Siddharth Maheshwari:
Automatic Event Scheduling in Mobile Social Network Communities. 403-410 - T. Andrew Yang, Radu E. Vlas, Alan Yang, Cristina Vlas:
Risk Management in the Era of BYOD: The Quintet of Technology Adoption, Controls, Liabilities, User Perception, and User Behavior. 411-416 - Xing Xie, Indrakshi Ray, Raman Adaikkalavan:
On the Efficient Processing of Multilevel Secure Continuous Queries. 417-422 - Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn
, Hadi Sharifi, Haiyong Xie:
ACaaS: Access Control as a Service for IaaS Cloud. 423-428 - Barbara Carminati
, Elena Ferrari
, Ngoc Hong Tran:
Enforcing Trust Preferences in Mobile Person-to-Person Payments. 429-434 - John Slankas, Laurie A. Williams:
Access Control Policy Extraction from Unconstrained Natural Language Text. 435-440 - Michael Oehler, Dhananjay S. Phatak:
A Conjunction for Private Stream Searching. 441-447 - Rui Zhao, Chuan Yue, Kun Sun:
A Security Analysis of Two Commercial Browser and Cloud Based Password Managers. 448-453 - Yang Wang, Yun Huang, Claudia Louis:
Towards a Framework for Privacy-Aware Mobile Crowdsourcing. 454-459 - Afshan Samani, Adrian T. Beinkowski, Raafat Aburukba, Hamada H. Ghenniwa:
Privacy Framework for Open Environments. 460-467 - Anthony Morton:
Measuring Inherent Privacy Concern and Desire for Privacy - A Pilot Survey Study of an Instrument to Measure Dispositional Privacy Concern. 468-477 - Patrick I. Offor
:
Managing Risk in Secure System: Antecedents to System Engineers' Trust Assumptions Decisions. 478-485 - Yasmeen Alufaisan, Alina Campan:
Preservation of Centrality Measures in Anonymized Social Networks. 486-493 - Vincent C. Hu
, Karen Scarfone:
Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit. 494-501 - Xia Yang, Jim Alves-Foss:
Security Policy Refinement: High-Level Specification to Low-Level Implementation. 502-511 - Owen Sacco, John G. Breslin:
"I Like" - Analysing Interactions within Social Networks to Assert the Trustworthiness of Users, Sources and Content. 512-519 - Regina Marin, Guillaume Piolle, Christophe Bidan:
An Analysis Grid for Privacy-Related Properties of Social Network Systems. 520-525 - Eli Omernick, Sara Owsley Sood:
The Impact of Anonymity in Online Communities. 526-535 - Jehwan Oh, Zoheb Hassan Borbora, Dhruv Sharma, Jaideep Srivastava
:
Bot Detection Based on Social Interactions in MMORPGs. 536-543 - Yousra Javed, Mohamed Shehab
:
Access Control Policy Misconfiguration Detection in Online Social Networks. 544-549 - Muhammad Asim
, David Llewellyn-Jones, Brett Lempereur, Bo Zhou, Qi Shi, Madjid Merabti:
Event Driven Monitoring of Composite Services. 550-557 - Amira Bradai, Hossam Afifi:
Game Theoretic Framework for Reputation-Based Distributed Intrusion Detection. 558-563 - Peter J. Radics, Denis Gracanin
, Dennis G. Kafura:
Preprocess before You Build: Introducing a Framework for Privacy Requirements Engineering. 564-569 - W. Brad Moore, Yifang Wei, Adam Orshefsky, Micah Sherr, Lisa Singh, Hui Yang:
Understanding Site-Based Inference Potential for Identifying Hidden Attributes. 570-577 - Michael Hanspach, Jörg Keller:
In Guards We Trust: Security and Privacy in Operating Systems Revisited. 578-585 - Vincent Lalanne, Manuel Munier, Alban Gabillon:
Information Security Risk Management in a World of Services. 586-593 - Michael E. Shin, Swetha Dorbala, Dongsoo Jang:
Threat Modeling for Security Failure-Tolerant Requirements. 594-599 - Johannes Braun, Gregor Rynkowski:
The Potential of an Individualized Set of Trusted CAs: Defending against CA Failures in the Web PKI. 600-605 - Arya Adriansyah, Boudewijn F. van Dongen
, Nicola Zannone
:
Controlling Break-the-Glass through Alignment. 606-611 - Hendrik J. G. Oberholzer, Sunday Olusegun Ojo
, Oludayo O. Olugbara:
A PET Evaluation Framework for Relational Databases. 612-617 - Ezhil Kalaimannan
, Jatinder N. D. Gupta
, Seong-Moo Yoo:
Maximizing Investigation Effectiveness in Digital Forensic Cases. 618-623 - Sharon Paradesi, Ilaria Liccardi, Lalana Kagal, Joe Pato:
A Semantic Framework for Content-Based Access Controls. 624-629 - Yair Diaz-Tellez, Eliane L. Bodanese, Fadi Ali El-Moussa, Theo Dimitrakos
:
Secure Execution Context Enforcement Framework Based on Activity Detection on Data and Applications Hosted on Smart Devices. 630-636 - Jussi Laakkonen, Salla Annala, Pekka Jäppinen:
Abstracted Architecture for Smart Grid Privacy Analysis. 637-646 - Achim D. Brucker
, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
A Framework for Secure Service Composition. 647-652 - Shuo Qiu, Jiqiang Liu, Yanfeng Shi:
Identity-Based Symmetric Private Set Intersection. 653-658 - Yong Wang, Raj Kumar Nepali:
Privacy Measurement for Social Network Actor Model. 659-664 - Xiang Li, Shaoyin Cheng, Wenlong Chen, Fan Jiang:
Effective Method for Promoting Viral Marketing in Microblog. 665-670 - Marco Guerini
, Jacopo Staiano
, Davide Albanese
:
Exploring Image Virality in Google Plus. 671-678 - Sandra Servia Rodríguez, Ana Fernández Vilas
, Rebeca P. Díaz Redondo
, José Juan Pazos-Arias:
Comparing Tag Clustering Algorithms for Mining Twitter Users' Interests. 679-684 - Xing Fang, Justin Zhan, Nicholas Koceja:
Towards Network Reduction on Big Data. 685-690 - Vito Giovanni Castellana, Antonino Tumeo
, Oreste Villa, David Haglin, John Feo:
Composing Data Parallel Code for a SPARQL Graph Engine. 691-699 - Sushil Jajodia
, Witold Litwin, Thomas J. E. Schwarz:
Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds. 700-707 - Salim Jouili, Valentin Vansteenberghe:
An Empirical Comparison of Graph Databases. 708-715 - A. Montplaisir-Goncalves, Naser Ezzati-Jivan, Florian Wininger, Michel R. Dagenais:
State History Tree: An Incremental Disk-Based Data Structure for Very Large Interval Data. 716-724 - Johanna Monti, Mario Monteleone, Maria Pia di Buono
, Federica Marano:
Natural Language Processing and Big Data - An Ontology-Based Approach for Cross-Lingual Information Retrieval. 725-731 - Salim Jouili, Aldemar Reynaga:
imGraph: A Distributed In-Memory Graph Database. 732-737 - Ehsan Mousavi Khaneghah
, Seyedeh Leili Mirtaheri, Lucio Grandinetti, Amir Saman Memaripour, Mohsen Sharifi
:
A Dynamic Replication Mechanism to Reduce Response-Time of I/O Operations in High Performance Computing Clusters. 738-743 - Bernardo Creamer, Germán Creamer:
Emissions Abating Technology Adoption under the SO2 Permit Market: A Social Networks Approach. 744-749 - Shaun Lichter, Terry L. Friesz, Christopher Griffin
:
Impact of a Non-linear Pay-Off Function on Pairwise Stable Collaborative Oligopolies. 750-755 - Ta-Wei Hung, Mu-En Wu, Hsueh-I Lu, Jan-Ming Ho:
Rating Equity Funds against Return of Random Traders. 756-761 - Henry Thille, Monica Cojocaru, Edward W. Thommes, Dominic Nelson, Scott Greenhalgh
:
A Dynamic Pricing Game in a Model of New Product Adoption with Social Influence. 762-767 - Carl M. Gustafson:
Three Fiscal Policy Experiments in an Agent-Based Macroeconomic Model. 768-773 - Márcia Baptista, Hugo Damas, Joana Dimas, Guilherme Raimundo, Rui Prada
, Carlos Martinho, Pedro Alexandre Santos
, Jorge F. Peña:
A Serious Game Based on a Public Goods Experiment. 774-781 - Hsin-Tsung Peng, William W. Y. Hsu, Chih-Hung Chen, Feipei Lai, Jan-Ming Ho:
FinancialCloud: Open Cloud Framework of Derivative Pricing. 782-789 - Andrey Bogomolov, Bruno Lepri, Fabio Pianesi:
Happiness Recognition from Mobile Phone Data. 790-795