callback( { "result":{ "query":":facetid:toc:\"db/conf/asunam/asonam2015.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"207.43" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"255", "@dc":"255", "@oc":"255", "@id":"43276572", "text":":facetid:toc:db/conf/asunam/asonam2015.bht" } }, "hits":{ "@total":"255", "@computed":"255", "@sent":"255", "@first":"0", "hit":[{ "@score":"1", "@id":"3497043", "info":{"authors":{"author":[{"@pid":"165/9162","text":"Quan Zheng 0001"},{"@pid":"s/DavidBSkillicorn","text":"David B. Skillicorn"}]},"title":"Spectral Embedding of Directed Networks.","venue":"ASONAM","pages":"432-439","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/0001S15","doi":"10.1145/2808797.2809310","ee":"https://doi.org/10.1145/2808797.2809310","url":"https://dblp.org/rec/conf/asunam/0001S15"}, "url":"URL#3497043" }, { "@score":"1", "@id":"3497044", "info":{"authors":{"author":[{"@pid":"171/2154","text":"Cherry Ahmed"},{"@pid":"142/1886","text":"Abeer ElKorany 0001"}]},"title":"Enhancing Link Prediction in Twitter using Semantic User Attributes.","venue":"ASONAM","pages":"1155-1161","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/AhmedE15","doi":"10.1145/2808797.2810056","ee":"https://doi.org/10.1145/2808797.2810056","url":"https://dblp.org/rec/conf/asunam/AhmedE15"}, "url":"URL#3497044" }, { "@score":"1", "@id":"3497045", "info":{"authors":{"author":[{"@pid":"80/7656","text":"Baris Akgün"},{"@pid":"16/6911","text":"Sule Gündüz Ögüdücü"}]},"title":"Streaming Linear Regression on Spark MLlib and MOA.","venue":"ASONAM","pages":"1244-1247","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/AkgunO15","doi":"10.1145/2808797.2809374","ee":"https://doi.org/10.1145/2808797.2809374","url":"https://dblp.org/rec/conf/asunam/AkgunO15"}, "url":"URL#3497045" }, { "@score":"1", "@id":"3497046", "info":{"authors":{"author":[{"@pid":"141/0096","text":"Riza Aktunc"},{"@pid":"t/IJToroslu","text":"Ismail Hakki Toroslu"},{"@pid":"140/9561","text":"Mert Ozer"},{"@pid":"d/HasanDavulcu","text":"Hasan Davulcu"}]},"title":"A Dynamic Modularity Based Community Detection Algorithm for Large-scale Networks: DSLM.","venue":"ASONAM","pages":"1177-1183","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/AktuncTOD15","doi":"10.1145/2808797.2808822","ee":"https://doi.org/10.1145/2808797.2808822","url":"https://dblp.org/rec/conf/asunam/AktuncTOD15"}, "url":"URL#3497046" }, { "@score":"1", "@id":"3497047", "info":{"authors":{"author":[{"@pid":"153/6791","text":"Amal Abdullah AlMansour"},{"@pid":"i/CSIliopoulos","text":"Costas S. Iliopoulos"}]},"title":"Using Arabic Microblogs Features in Determining Credibility.","venue":"ASONAM","pages":"1212-1219","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/AlMansourI15","doi":"10.1145/2808797.2808819","ee":"https://doi.org/10.1145/2808797.2808819","url":"https://dblp.org/rec/conf/asunam/AlMansourI15"}, "url":"URL#3497047" }, { "@score":"1", "@id":"3497048", "info":{"authors":{"author":[{"@pid":"141/2056","text":"Majed A. AlRubaian"},{"@pid":"138/7001","text":"Muhammad Al-Qurishi"},{"@pid":"150/8548","text":"Mabrook Al-Rakhami"},{"@pid":"67/1359","text":"Sk. Md. Mizanur Rahman"},{"@pid":"25/2352","text":"Atif Alamri"}]},"title":"A Multistage Credibility Analysis Model for Microblogs.","venue":"ASONAM","pages":"1434-1440","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/AlRubaianAARA15","doi":"10.1145/2808797.2810065","ee":"https://doi.org/10.1145/2808797.2810065","url":"https://dblp.org/rec/conf/asunam/AlRubaianAARA15"}, "url":"URL#3497048" }, { "@score":"1", "@id":"3497049", "info":{"authors":{"author":[{"@pid":"165/9240","text":"Russell Allsup"},{"@pid":"05/10790","text":"Evan Thomas"},{"@pid":"165/9312","text":"Bryan Monk"},{"@pid":"71/6909","text":"Richard Frank"},{"@pid":"57/955-2","text":"Martin Bouchard 0002"}]},"title":"Networking in Child Exploitation: Assessing disruption strategies using registrant information.","venue":"ASONAM","pages":"400-407","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/AllsupTMFB15","doi":"10.1145/2808797.2809297","ee":"https://doi.org/10.1145/2808797.2809297","url":"https://dblp.org/rec/conf/asunam/AllsupTMFB15"}, "url":"URL#3497049" }, { "@score":"1", "@id":"3497050", "info":{"authors":{"author":{"@pid":"171/2122","text":"Nora Alrajebah"}},"title":"Investigating the Structural Characteristics of Cascades on Tumblr.","venue":"ASONAM","pages":"910-917","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Alrajebah15","doi":"10.1145/2808797.2808814","ee":"https://doi.org/10.1145/2808797.2808814","url":"https://dblp.org/rec/conf/asunam/Alrajebah15"}, "url":"URL#3497050" }, { "@score":"1", "@id":"3497051", "info":{"authors":{"author":[{"@pid":"160/9655","text":"Nasser Alsaedi"},{"@pid":"80/305","text":"Pete Burnap"}]},"title":"Feature Extraction and Analysis for Identifying Disruptive Events from Social Media.","venue":"ASONAM","pages":"1495-1502","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/AlsaediB15","doi":"10.1145/2808797.2808867","ee":"https://doi.org/10.1145/2808797.2808867","url":"https://dblp.org/rec/conf/asunam/AlsaediB15"}, "url":"URL#3497051" }, { "@score":"1", "@id":"3497052", "info":{"authors":{"author":[{"@pid":"160/9655","text":"Nasser Alsaedi"},{"@pid":"80/305","text":"Pete Burnap"},{"@pid":"r/OmerFRana","text":"Omer F. Rana"}]},"title":"Identifying Disruptive Events from Social Media to Enhance Situational Awareness.","venue":"ASONAM","pages":"934-941","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/AlsaediBR15","doi":"10.1145/2808797.2808879","ee":"https://doi.org/10.1145/2808797.2808879","url":"https://dblp.org/rec/conf/asunam/AlsaediBR15"}, "url":"URL#3497052" }, { "@score":"1", "@id":"3497053", "info":{"authors":{"author":[{"@pid":"88/9414","text":"Alessia Amelio"},{"@pid":"p/ClaraPizzuti","text":"Clara Pizzuti"}]},"title":"Is Normalized Mutual Information a Fair Measure for Comparing Community Detection Methods?","venue":"ASONAM","pages":"1584-1585","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/AmelioP15","doi":"10.1145/2808797.2809344","ee":"https://doi.org/10.1145/2808797.2809344","url":"https://dblp.org/rec/conf/asunam/AmelioP15"}, "url":"URL#3497053" }, { "@score":"1", "@id":"3497054", "info":{"authors":{"author":[{"@pid":"25/7179","text":"Carlos Rene Argueta"},{"@pid":"164/6656","text":"Elvis Saravia"},{"@pid":"27/3795","text":"Yi-Shin Chen"}]},"title":"Unsupervised Graph-Based Patterns Extraction for Emotion Classification.","venue":"ASONAM","pages":"336-341","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ArguetaSC15","doi":"10.1145/2808797.2809419","ee":"https://doi.org/10.1145/2808797.2809419","url":"https://dblp.org/rec/conf/asunam/ArguetaSC15"}, "url":"URL#3497054" }, { "@score":"1", "@id":"3497055", "info":{"authors":{"author":[{"@pid":"126/8861","text":"Piyush Arora"},{"@pid":"41/7272","text":"Debasis Ganguly"},{"@pid":"81/4050","text":"Gareth J. F. Jones"}]},"title":"The Good, the Bad and their Kins: Identifying Questions with Negative Scores in StackOverflow.","venue":"ASONAM","pages":"1232-1239","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/AroraGJ15","doi":"10.1145/2808797.2809318","ee":"https://doi.org/10.1145/2808797.2809318","url":"https://dblp.org/rec/conf/asunam/AroraGJ15"}, "url":"URL#3497055" }, { "@score":"1", "@id":"3497056", "info":{"authors":{"author":[{"@pid":"171/2181","text":"Jean-Philippe Attal"},{"@pid":"75/6276","text":"Maria Malek"}]},"title":"A New Label Propagation With Dams.","venue":"ASONAM","pages":"1292-1299","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/AttalM15","doi":"10.1145/2808797.2808826","ee":"https://doi.org/10.1145/2808797.2808826","url":"https://dblp.org/rec/conf/asunam/AttalM15"}, "url":"URL#3497056" }, { "@score":"1", "@id":"3497057", "info":{"authors":{"author":[{"@pid":"171/2268","text":"Thomas Attema"},{"@pid":"59/117","text":"Peter-Paul van Maanen"},{"@pid":"40/4238","text":"Erik Meeuwissen"}]},"title":"Development and Evaluation of Multi-Agent Models Predicting Twitter Trends in Multiple Domains.","venue":"ASONAM","pages":"1133-1140","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/AttemaMM15","doi":"10.1145/2808797.2808858","ee":"https://doi.org/10.1145/2808797.2808858","url":"https://dblp.org/rec/conf/asunam/AttemaMM15"}, "url":"URL#3497057" }, { "@score":"1", "@id":"3497058", "info":{"authors":{"author":[{"@pid":"04/5911","text":"Chen Avin"},{"@pid":"74/3704","text":"Zvi Lotker"},{"@pid":"p/DavidPeleg","text":"David Peleg"},{"@pid":"154/6597","text":"Itzik Turkel"}]},"title":"Social Network Analysis of Program Committees and Paper Acceptance Fairness.","venue":"ASONAM","pages":"488-495","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/AvinLPT15","doi":"10.1145/2808797.2809305","ee":"https://doi.org/10.1145/2808797.2809305","url":"https://dblp.org/rec/conf/asunam/AvinLPT15"}, "url":"URL#3497058" }, { "@score":"1", "@id":"3497059", "info":{"authors":{"author":[{"@pid":"145/7164","text":"Aimée Backiel"},{"@pid":"171/2232","text":"Yannick Verbinnen"},{"@pid":"43/4264","text":"Bart Baesens"},{"@pid":"65/8000","text":"Gerda Claeskens"}]},"title":"Combining Local and Social Network Classifiers to Improve Churn Prediction.","venue":"ASONAM","pages":"651-658","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BackielVBC15","doi":"10.1145/2808797.2808850","ee":"https://doi.org/10.1145/2808797.2808850","url":"https://dblp.org/rec/conf/asunam/BackielVBC15"}, "url":"URL#3497059" }, { "@score":"1", "@id":"3497060", "info":{"authors":{"author":[{"@pid":"139/2286","text":"Yuanyuan Bao"},{"@pid":"139/2292","text":"Chengqi Yi"},{"@pid":"153/2824","text":"Jingchi Jiang"},{"@pid":"65/5049","text":"Yibo Xue"},{"@pid":"31/6779","text":"Yingfei Dong"}]},"title":"Implementation of Chaotic Analysis on Retweet Time Series.","venue":"ASONAM","pages":"1225-1231","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BaoYJXD15","doi":"10.1145/2808797.2808881","ee":"https://doi.org/10.1145/2808797.2808881","url":"https://dblp.org/rec/conf/asunam/BaoYJXD15"}, "url":"URL#3497060" }, { "@score":"1", "@id":"3497061", "info":{"authors":{"author":[{"@pid":"89/7803-1","text":"Luciano Barreto 0001"},{"@pid":"70/8110","text":"Antonio Celesti"},{"@pid":"70/450","text":"Massimo Villari"},{"@pid":"09/4135","text":"Maria Fazio"},{"@pid":"15/7009","text":"Antonio Puliafito"}]},"title":"An Authentication Model for IoT Clouds.","venue":"ASONAM","pages":"1032-1035","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BarretoCVFP15","doi":"10.1145/2808797.2809361","ee":"https://doi.org/10.1145/2808797.2809361","url":"https://dblp.org/rec/conf/asunam/BarretoCVFP15"}, "url":"URL#3497061" }, { "@score":"1", "@id":"3497062", "info":{"authors":{"author":[{"@pid":"31/5615","text":"Prithwish Basu"},{"@pid":"s/RaviSundaram","text":"Ravi Sundaram"},{"@pid":"143/4613","text":"Matthew Dippel"}]},"title":"Multiplex networks: a Generative Model and Algorithmic Complexity.","venue":"ASONAM","pages":"456-463","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BasuSD15","doi":"10.1145/2808797.2808900","ee":"https://doi.org/10.1145/2808797.2808900","url":"https://dblp.org/rec/conf/asunam/BasuSD15"}, "url":"URL#3497062" }, { "@score":"1", "@id":"3497063", "info":{"authors":{"author":[{"@pid":"35/10486","text":"Ben Baumer"},{"@pid":"39/9890","text":"George Rabanca"},{"@pid":"b/AmotzBarNoy","text":"Amotz Bar-Noy"},{"@pid":"31/5615","text":"Prithwish Basu"}]},"title":"Star Search: Effective Subgroups in Collaborative Social Networks.","venue":"ASONAM","pages":"729-736","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BaumerRBB15","doi":"10.1145/2808797.2810062","ee":"https://doi.org/10.1145/2808797.2810062","url":"https://dblp.org/rec/conf/asunam/BaumerRBB15"}, "url":"URL#3497063" }, { "@score":"1", "@id":"3497064", "info":{"authors":{"author":[{"@pid":"121/3245","text":"Mohammed Bekkali"},{"@pid":"130/3813","text":"Issam Sahmoudi"},{"@pid":"94/7761","text":"Abdelmonaime Lachkar"}]},"title":"Enriching Arabic Tweets Representation based on Web Search Engine and the Rough Set Theory.","venue":"ASONAM","pages":"1573-1574","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BekkaliSL15","doi":"10.1145/2808797.2809339","ee":"https://doi.org/10.1145/2808797.2809339","url":"https://dblp.org/rec/conf/asunam/BekkaliSL15"}, "url":"URL#3497064" }, { "@score":"1", "@id":"3497065", "info":{"authors":{"author":[{"@pid":"171/2212","text":"Souhila Benmakrelouf"},{"@pid":"97/2284","text":"Neila Mezghani"},{"@pid":"60/5323","text":"Nadjia Kara"}]},"title":"Towards the Identification of Players' Profiles Using Game's Data Analysis Based on Regression Model and Clustering.","venue":"ASONAM","pages":"1403-1410","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BenmakreloufMK15","doi":"10.1145/2808797.2809429","ee":"https://doi.org/10.1145/2808797.2809429","url":"https://dblp.org/rec/conf/asunam/BenmakreloufMK15"}, "url":"URL#3497065" }, { "@score":"1", "@id":"3497066", "info":{"authors":{"author":[{"@pid":"162/3259","text":"Oualid Benyahia"},{"@pid":"l/ChristineLargeron","text":"Christine Largeron"}]},"title":"Centrality for graphs with numerical attributes.","venue":"ASONAM","pages":"1348-1353","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BenyahiaL15","doi":"10.1145/2808797.2808844","ee":"https://doi.org/10.1145/2808797.2808844","url":"https://dblp.org/rec/conf/asunam/BenyahiaL15"}, "url":"URL#3497066" }, { "@score":"1", "@id":"3497067", "info":{"authors":{"author":[{"@pid":"153/2854","text":"Adham Beykikhoshk"},{"@pid":"98/5718","text":"Ognjen Arandjelovic"},{"@pid":"71/5859","text":"Dinh Q. Phung"},{"@pid":"81/1984","text":"Svetha Venkatesh"}]},"title":"Overcoming Data Scarcity of Twitter: Using Tweets as Bootstrap with Application to Autism-Related Topic Content Analysis.","venue":"ASONAM","pages":"1354-1361","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BeykikhoshkAPV15","doi":"10.1145/2808797.2808908","ee":"https://doi.org/10.1145/2808797.2808908","url":"https://dblp.org/rec/conf/asunam/BeykikhoshkAPV15"}, "url":"URL#3497067" }, { "@score":"1", "@id":"3497068", "info":{"authors":{"author":[{"@pid":"122/2112","text":"Santosh Kumar Bharti"},{"@pid":"11/8472","text":"Korra Sathya Babu"},{"@pid":"45/200","text":"Sanjay Kumar Jena"}]},"title":"Parsing-based Sarcasm Sentiment Recognition in Twitter Data.","venue":"ASONAM","pages":"1373-1380","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BhartiBJ15","doi":"10.1145/2808797.2808910","ee":"https://doi.org/10.1145/2808797.2808910","url":"https://dblp.org/rec/conf/asunam/BhartiBJ15"}, "url":"URL#3497068" }, { "@score":"1", "@id":"3497069", "info":{"authors":{"author":[{"@pid":"171/2270","text":"Christos Bilanakos"},{"@pid":"80/4302","text":"Dionisios N. Sotiropoulos"},{"@pid":"171/2201","text":"Ifigeneia Georgoula"},{"@pid":"79/6899","text":"George M. Giaglis"}]},"title":"Optimal Influence Strategies in Social Networks.","venue":"ASONAM","pages":"856-863","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BilanakosSGG15","doi":"10.1145/2808797.2808907","ee":"https://doi.org/10.1145/2808797.2808907","url":"https://dblp.org/rec/conf/asunam/BilanakosSGG15"}, "url":"URL#3497069" }, { "@score":"1", "@id":"3497070", "info":{"authors":{"author":[{"@pid":"122/5953","text":"Federica Bisio"},{"@pid":"171/2210","text":"Claudia Meda"},{"@pid":"23/3610","text":"Rodolfo Zunino"},{"@pid":"47/8946","text":"Roberto Surlinelli"},{"@pid":"139/2300","text":"Eugenio Scillia"},{"@pid":"139/2257","text":"Augusto Ottaviano"}]},"title":"Real-time monitoring of Twitter traffic by using semantic networks.","venue":"ASONAM","pages":"966-969","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BisioMZSSO15","doi":"10.1145/2808797.2809371","ee":"https://doi.org/10.1145/2808797.2809371","url":"https://dblp.org/rec/conf/asunam/BisioMZSSO15"}, "url":"URL#3497070" }, { "@score":"1", "@id":"3497071", "info":{"authors":{"author":[{"@pid":"156/1043","text":"Imen Bizid"},{"@pid":"65/8845","text":"Nibal Nayef"},{"@pid":"64/4705","text":"Patrice Boursier"},{"@pid":"34/4664","text":"Sami Faïz"},{"@pid":"171/2187","text":"Jacques Morcos"}]},"title":"Prominent Users Detection during Specific Events by Learning On- and Off-topic Features of User Activities.","venue":"ASONAM","pages":"500-503","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BizidNBFM15","doi":"10.1145/2808797.2809411","ee":"https://doi.org/10.1145/2808797.2809411","url":"https://dblp.org/rec/conf/asunam/BizidNBFM15"}, "url":"URL#3497071" }, { "@score":"1", "@id":"3497072", "info":{"authors":{"author":[{"@pid":"171/2263","text":"Yasmin Bokobza"},{"@pid":"150/2020","text":"Abigail Paradise"},{"@pid":"39/7819","text":"Guy Rapaport"},{"@pid":"13/3098","text":"Rami Puzis"},{"@pid":"74/6180","text":"Bracha Shapira"},{"@pid":"56/5380","text":"Asaf Shabtai"}]},"title":"Leak Sinks: The Threat of Targeted Social Eavesdropping.","venue":"ASONAM","pages":"375-382","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BokobzaPRPSS15","doi":"10.1145/2808797.2808891","ee":"https://doi.org/10.1145/2808797.2808891","url":"https://dblp.org/rec/conf/asunam/BokobzaPRPSS15"}, "url":"URL#3497072" }, { "@score":"1", "@id":"3497073", "info":{"authors":{"author":[{"@pid":"171/2285","text":"Mondher Bouazizi"},{"@pid":"74/1137","text":"Tomoaki Ohtsuki"}]},"title":"Opinion Mining in Twitter How to Make Use of Sarcasm to Enhance Sentiment Analysis.","venue":"ASONAM","pages":"1594-1597","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BouaziziO15","doi":"10.1145/2808797.2809350","ee":"https://doi.org/10.1145/2808797.2809350","url":"https://dblp.org/rec/conf/asunam/BouaziziO15"}, "url":"URL#3497073" }, { "@score":"1", "@id":"3497074", "info":{"authors":{"author":[{"@pid":"128/5032","text":"Kristijan Breznik"},{"@pid":"118/8743","text":"Giancarlo Ragozini"}]},"title":"Exploring the Italian Erasmus Agreements by a Network Analysis Perspective.","venue":"ASONAM","pages":"837-838","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BreznikR15","doi":"10.1145/2808797.2808864","ee":"https://doi.org/10.1145/2808797.2808864","url":"https://dblp.org/rec/conf/asunam/BreznikR15"}, "url":"URL#3497074" }, { "@score":"1", "@id":"3497075", "info":{"authors":{"author":[{"@pid":"124/2354","text":"Robert A. Bridges"},{"@pid":"171/2248","text":"John P. Collins"},{"@pid":"123/9655","text":"Erik M. Ferragut"},{"@pid":"158/5374","text":"Jason A. Laska"},{"@pid":"21/10630","text":"Blair D. Sullivan"}]},"title":"Multi-Level Anomaly Detection on Time-Varying Graph Data.","venue":"ASONAM","pages":"579-583","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BridgesCFLS15","doi":"10.1145/2808797.2809406","ee":"https://doi.org/10.1145/2808797.2809406","url":"https://dblp.org/rec/conf/asunam/BridgesCFLS15"}, "url":"URL#3497075" }, { "@score":"1", "@id":"3497076", "info":{"authors":{"author":[{"@pid":"118/5506","text":"Christian Brugger"},{"@pid":"171/2191","text":"André Lucas Chinazzo"},{"@pid":"171/2151","text":"Alexandre Flores John"},{"@pid":"60/9861","text":"Christian de Schryver"},{"@pid":"48/6980","text":"Norbert Wehn"},{"@pid":"135/5777","text":"Andreas Spitz"},{"@pid":"l/KatharinaAnnaLehmann","text":"Katharina Anna Zweig"}]},"title":"Exploiting Phase Transitions for the Efficient Sampling of the Fixed Degree Sequence Model.","venue":"ASONAM","pages":"308-313","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BruggerCJSWSZ15","doi":"10.1145/2808797.2809388","ee":"https://doi.org/10.1145/2808797.2809388","url":"https://dblp.org/rec/conf/asunam/BruggerCJSWSZ15"}, "url":"URL#3497076" }, { "@score":"1", "@id":"3497077", "info":{"authors":{"author":[{"@pid":"26/2403","text":"Joel Brynielsson"},{"@pid":"171/2197","text":"Rishie Sharma"}]},"title":"Detectability of Low-Rate HTTP Server DoS Attacks using Spectral Analysis.","venue":"ASONAM","pages":"954-961","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BrynielssonS15","doi":"10.1145/2808797.2808810","ee":"https://doi.org/10.1145/2808797.2808810","url":"https://dblp.org/rec/conf/asunam/BrynielssonS15"}, "url":"URL#3497077" }, { "@score":"1", "@id":"3497078", "info":{"authors":{"author":[{"@pid":"80/305","text":"Pete Burnap"},{"@pid":"142/6631","text":"Amir Javed"},{"@pid":"r/OmerFRana","text":"Omer F. Rana"},{"@pid":"43/531","text":"Malik Shahzad Kaleem Awan"}]},"title":"Real-time Classification of Malicious URLs on Twitter using Machine Activity Data.","venue":"ASONAM","pages":"970-977","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/BurnapJRA15","doi":"10.1145/2808797.2809281","ee":"https://doi.org/10.1145/2808797.2809281","url":"https://dblp.org/rec/conf/asunam/BurnapJRA15"}, "url":"URL#3497078" }, { "@score":"1", "@id":"3497079", "info":{"authors":{"author":[{"@pid":"164/6673","text":"Fernando Calderon"},{"@pid":"88/1509","text":"Chun-Hao Chang"},{"@pid":"25/7179","text":"Carlos Rene Argueta"},{"@pid":"164/6656","text":"Elvis Saravia"},{"@pid":"27/3795","text":"Yi-Shin Chen"}]},"title":"Analyzing Event Opinion Transition through Summarized Emotion Visualization.","venue":"ASONAM","pages":"749-752","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/CalderonCASC15","doi":"10.1145/2808797.2808801","ee":"https://doi.org/10.1145/2808797.2808801","url":"https://dblp.org/rec/conf/asunam/CalderonCASC15"}, "url":"URL#3497079" }, { "@score":"1", "@id":"3497080", "info":{"authors":{"author":[{"@pid":"168/8634","text":"Maël Canu"},{"@pid":"00/5451","text":"Marcin Detyniecki"},{"@pid":"10/2063","text":"Marie-Jeanne Lesot"},{"@pid":"73/5106","text":"Adrien Revault d'Allonnes"}]},"title":"Fast community structure local uncovering by independent vertex-centred process.","venue":"ASONAM","pages":"823-830","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/CanuDLd15","doi":"10.1145/2808797.2808866","ee":"https://doi.org/10.1145/2808797.2808866","url":"https://dblp.org/rec/conf/asunam/CanuDLd15"}, "url":"URL#3497080" }, { "@score":"1", "@id":"3497081", "info":{"authors":{"author":[{"@pid":"19/4210","text":"C. Marie-Françoise Canut"},{"@pid":"156/3518","text":"Sirinya On-at"},{"@pid":"95/5309","text":"André Péninou"},{"@pid":"87/5209","text":"Florence Sèdes"}]},"title":"Time-aware Egocentric network-based User Profiling.","venue":"ASONAM","pages":"569-572","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/CanutOPS15","doi":"10.1145/2808797.2809415","ee":"https://doi.org/10.1145/2808797.2809415","url":"https://dblp.org/rec/conf/asunam/CanutOPS15"}, "url":"URL#3497081" }, { "@score":"1", "@id":"3497082", "info":{"authors":{"author":[{"@pid":"20/4777","text":"Bogdan Carbunar"},{"@pid":"92/8486","text":"Rahul Potharaju"}]},"title":"A Longitudinal Study of the Google App Market.","venue":"ASONAM","pages":"242-249","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/CarbunarP15","doi":"10.1145/2808797.2808823","ee":"https://doi.org/10.1145/2808797.2808823","url":"https://dblp.org/rec/conf/asunam/CarbunarP15"}, "url":"URL#3497082" }, { "@score":"1", "@id":"3497083", "info":{"authors":{"author":[{"@pid":"120/9604","text":"Jordi Casas-Roma"},{"@pid":"56/6789-1","text":"François Rousseau 0001"}]},"title":"Community-Preserving Generalization of Social Networks.","venue":"ASONAM","pages":"1465-1472","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Casas-RomaR15","doi":"10.1145/2808797.2808854","ee":"https://doi.org/10.1145/2808797.2808854","url":"https://dblp.org/rec/conf/asunam/Casas-RomaR15"}, "url":"URL#3497083" }, { "@score":"1", "@id":"3497084", "info":{"authors":{"author":[{"@pid":"147/5165","text":"Giuseppe Cascavilla"},{"@pid":"82/4386","text":"Mauro Conti"},{"@pid":"28/2862","text":"David G. Schwartz"},{"@pid":"85/4767","text":"Inbal Yahav"}]},"title":"Revealing Censored Information Through Comments and Commenters in Online Social Networks.","venue":"ASONAM","pages":"675-680","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/CascavillaCSY15","doi":"10.1145/2808797.2809290","ee":"https://doi.org/10.1145/2808797.2809290","url":"https://dblp.org/rec/conf/asunam/CascavillaCSY15"}, "url":"URL#3497084" }, { "@score":"1", "@id":"3497085", "info":{"authors":{"author":[{"@pid":"07/4492","text":"Betul Ceran"},{"@pid":"171/2148","text":"Nitesh Kedia"},{"@pid":"91/1535","text":"Steven R. Corman"},{"@pid":"d/HasanDavulcu","text":"Hasan Davulcu"}]},"title":"Story Detection Using Generalized Concepts and Relations.","venue":"ASONAM","pages":"942-949","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/CeranKCD15","doi":"10.1145/2808797.2809312","ee":"https://doi.org/10.1145/2808797.2809312","url":"https://dblp.org/rec/conf/asunam/CeranKCD15"}, "url":"URL#3497085" }, { "@score":"1", "@id":"3497086", "info":{"authors":{"author":[{"@pid":"146/0447","text":"Saptarshi Chakraborty"},{"@pid":"92/3463","text":"B. K. Tripathy 0001"}]},"title":"Privacy Preservation in Social networks through alpha: anonymization techniques.","venue":"ASONAM","pages":"1602-1603","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ChakrabortyT15","doi":"10.1145/2808797.2809354","ee":"https://doi.org/10.1145/2808797.2809354","url":"https://dblp.org/rec/conf/asunam/ChakrabortyT15"}, "url":"URL#3497086" }, { "@score":"1", "@id":"3497087", "info":{"authors":{"author":[{"@pid":"153/4632","text":"Chien-Wei Chang"},{"@pid":"43/2669","text":"Mi-Yen Yeh"},{"@pid":"43/6010","text":"Kun-Ta Chuang"}]},"title":"On Influence Maximization to Target Users in the Presence of Multiple Acceptances.","venue":"ASONAM","pages":"1592-1593","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ChangYC15","doi":"10.1145/2808797.2809349","ee":"https://doi.org/10.1145/2808797.2809349","url":"https://dblp.org/rec/conf/asunam/ChangYC15"}, "url":"URL#3497087" }, { "@score":"1", "@id":"3497088", "info":{"authors":{"author":[{"@pid":"171/2169","text":"Christos Charitonidis"},{"@pid":"26/3330","text":"Awais Rashid"},{"@pid":"75/9371","text":"Paul J. Taylor"}]},"title":"Weak Signals as Predictors of Real-World Phenomena in Social Media.","venue":"ASONAM","pages":"864-871","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/CharitonidisRT15","doi":"10.1145/2808797.2809332","ee":"https://doi.org/10.1145/2808797.2809332","url":"https://dblp.org/rec/conf/asunam/CharitonidisRT15"}, "url":"URL#3497088" }, { "@score":"1", "@id":"3497089", "info":{"authors":{"author":[{"@pid":"87/4522","text":"Arijit Chatterjee"},{"@pid":"p/WilliamPerrizo","text":"William Perrizo"}]},"title":"Classifying Stocks using P-Trees and Investor Sentiment.","venue":"ASONAM","pages":"1362-1367","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ChatterjeeP15","doi":"10.1145/2808797.2808845","ee":"https://doi.org/10.1145/2808797.2808845","url":"https://dblp.org/rec/conf/asunam/ChatterjeeP15"}, "url":"URL#3497089" }, { "@score":"1", "@id":"3497090", "info":{"authors":{"author":[{"@pid":"117/6270","text":"Yuan-Chang Chen"},{"@pid":"135/0217","text":"Hao-Shang Ma"},{"@pid":"29/5543","text":"Jen-Wei Huang"}]},"title":"Multi-state Open Opinion Model based on Positive and Negative Social Influences.","venue":"ASONAM","pages":"170-177","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ChenMH15","doi":"10.1145/2808797.2808901","ee":"https://doi.org/10.1145/2808797.2808901","url":"https://dblp.org/rec/conf/asunam/ChenMH15"}, "url":"URL#3497090" }, { "@score":"1", "@id":"3497091", "info":{"authors":{"author":[{"@pid":"18/4198","text":"Ran Cheng"},{"@pid":"p/JunPang","text":"Jun Pang 0001"},{"@pid":"06/6785-16","text":"Yang Zhang 0016"}]},"title":"Inferring Friendship from Check-in Data of Location-Based Social Networks.","venue":"ASONAM","pages":"1284-1291","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ChengPZ15","doi":"10.1145/2808797.2808884","ee":"https://doi.org/10.1145/2808797.2808884","url":"https://dblp.org/rec/conf/asunam/ChengPZ15"}, "url":"URL#3497091" }, { "@score":"1", "@id":"3497092", "info":{"authors":{"author":[{"@pid":"159/1787","text":"Anamika Chhabra"},{"@pid":"90/10042","text":"S. R. S. Iyengar"},{"@pid":"26/10805","text":"Poonam Saini"},{"@pid":"159/1620","text":"Rajesh Shreedhar Bhat"}]},"title":"Presence of an Ecosystem: a Catalyst in the Knowledge Building Process in Crowdsourced Annotation Environments.","venue":"ASONAM","pages":"286-291","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ChhabraISB15","doi":"10.1145/2808797.2809410","ee":"https://doi.org/10.1145/2808797.2809410","url":"https://dblp.org/rec/conf/asunam/ChhabraISB15"}, "url":"URL#3497092" }, { "@score":"1", "@id":"3497093", "info":{"authors":{"author":[{"@pid":"83/9923","text":"Niyati Chhaya"},{"@pid":"171/2220","text":"Dhwanit Agarwal"},{"@pid":"171/2230","text":"Nikaash Puri"},{"@pid":"17/10818","text":"Paridhi Jain 0001"},{"@pid":"119/3629","text":"Deepak Pai"},{"@pid":"97/5147","text":"Ponnurangam Kumaraguru"}]},"title":"EnTwine: Feature Analysis and Candidate Selection for Social User Identity Aggregation.","venue":"ASONAM","pages":"1575-1576","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ChhayaAPJPK15","doi":"10.1145/2808797.2809340","ee":"https://doi.org/10.1145/2808797.2809340","url":"https://dblp.org/rec/conf/asunam/ChhayaAPJPK15"}, "url":"URL#3497093" }, { "@score":"1", "@id":"3497094", "info":{"authors":{"author":[{"@pid":"78/5975","text":"Meng-Fen Chiang"},{"@pid":"l/EePengLim","text":"Ee-Peng Lim"},{"@pid":"142/3321","text":"Jia-Wei Low"}]},"title":"On Mining Lifestyles from User Trip Data.","venue":"ASONAM","pages":"145-152","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ChiangLL15","doi":"10.1145/2808797.2808906","ee":"https://doi.org/10.1145/2808797.2808906","url":"https://dblp.org/rec/conf/asunam/ChiangLL15"}, "url":"URL#3497094" }, { "@score":"1", "@id":"3497095", "info":{"authors":{"author":[{"@pid":"125/3897","text":"Yun-Shang Chiou"},{"@pid":"171/2202","text":"Yohana Natalia Cahyono"}]},"title":"The invisible cultural heritage in spatial organization.","venue":"ASONAM","pages":"839-847","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ChiouC15","doi":"10.1145/2808797.2809321","ee":"https://doi.org/10.1145/2808797.2809321","url":"https://dblp.org/rec/conf/asunam/ChiouC15"}, "url":"URL#3497095" }, { "@score":"1", "@id":"3497096", "info":{"authors":{"author":[{"@pid":"82/10264","text":"Sarvenaz Choobdar"},{"@pid":"82/451mp","text":"Pedro Manuel Pinto Ribeiro"},{"@pid":"16/940","text":"Fernando M. A. Silva"}]},"title":"Pairwise structural role mining for user categorization in information cascades.","venue":"ASONAM","pages":"137-144","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ChoobdarRS15","doi":"10.1145/2808797.2808909","ee":"https://doi.org/10.1145/2808797.2808909","url":"https://dblp.org/rec/conf/asunam/ChoobdarRS15"}, "url":"URL#3497096" }, { "@score":"1", "@id":"3497097", "info":{"authors":{"author":[{"@pid":"132/3062","text":"Yehonatan Cohen"},{"@pid":"71/1483","text":"Danny Hendler"}]},"title":"Birds of a Feather Flock Together: The Accidental Communities of Spammers.","venue":"ASONAM","pages":"986-993","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/CohenH15","doi":"10.1145/2808797.2808843","ee":"https://doi.org/10.1145/2808797.2808843","url":"https://dblp.org/rec/conf/asunam/CohenH15"}, "url":"URL#3497097" }, { "@score":"1", "@id":"3497098", "info":{"authors":{"author":[{"@pid":"171/2276","text":"Jason Cohn"},{"@pid":"127/7582","text":"Alex Kuntz"},{"@pid":"b/LawrenceBirnbaum","text":"Larry Birnbaum"}]},"title":"AttitudeBuzz: Using Social Media Data to Localize Complex Attitudes.","venue":"ASONAM","pages":"1569-1570","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/CohnKB15","doi":"10.1145/2808797.2809336","ee":"https://doi.org/10.1145/2808797.2809336","url":"https://dblp.org/rec/conf/asunam/CohnKB15"}, "url":"URL#3497098" }, { "@score":"1", "@id":"3497099", "info":{"authors":{"author":[{"@pid":"c/MartineCollard","text":"Martine Collard"},{"@pid":"31/4639","text":"Philippe Collard"},{"@pid":"57/4388","text":"Laurent Brisson"},{"@pid":"20/8138","text":"Erick Stattner"}]},"title":"Rumor Spreading Modeling: Profusion versus Scarcity.","venue":"ASONAM","pages":"1547-1554","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/CollardCBS15","doi":"10.1145/2808797.2809299","ee":"https://doi.org/10.1145/2808797.2809299","url":"https://dblp.org/rec/conf/asunam/CollardCBS15"}, "url":"URL#3497099" }, { "@score":"1", "@id":"3497100", "info":{"authors":{"author":[{"@pid":"93/3295","text":"Angelo Corallo"},{"@pid":"64/7375","text":"Cristian Bisconti"},{"@pid":"13/10019","text":"Laura Fortunato"},{"@pid":"119/4879","text":"Antonio Andrea Gentile"},{"@pid":"140/7415","text":"Piergiuseppe Pellè"}]},"title":"An approach from statistical mechanics for collaborative business social network reconstruction.","venue":"ASONAM","pages":"565-568","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/CoralloBFGP15","doi":"10.1145/2808797.2809377","ee":"https://doi.org/10.1145/2808797.2809377","url":"https://dblp.org/rec/conf/asunam/CoralloBFGP15"}, "url":"URL#3497100" }, { "@score":"1", "@id":"3497101", "info":{"authors":{"author":[{"@pid":"26/4019","text":"Gennaro Cordasco"},{"@pid":"28/5375","text":"Luisa Gargano"},{"@pid":"r/AdeleARescigno","text":"Adele Anna Rescigno"}]},"title":"Influence Propagation over Large Scale Social Networks.","venue":"ASONAM","pages":"1531-1538","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/CordascoGR15","doi":"10.1145/2808797.2808888","ee":"https://doi.org/10.1145/2808797.2808888","url":"https://dblp.org/rec/conf/asunam/CordascoGR15"}, "url":"URL#3497101" }, { "@score":"1", "@id":"3497102", "info":{"authors":{"author":[{"@pid":"171/2237","text":"Marco Corneli"},{"@pid":"49/10867","text":"Pierre Latouche"},{"@pid":"23/2793","text":"Fabrice Rossi"}]},"title":"Modelling time evolving interactions in networks through a non stationary extension of stochastic block models.","venue":"ASONAM","pages":"1590-1591","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/CorneliLR15","doi":"10.1145/2808797.2809348","ee":"https://doi.org/10.1145/2808797.2809348","url":"https://dblp.org/rec/conf/asunam/CorneliLR15"}, "url":"URL#3497102" }, { "@score":"1", "@id":"3497103", "info":{"authors":{"author":[{"@pid":"131/4689","text":"Jean Creusefond"},{"@pid":"74/2518","text":"Thomas Largillier"},{"@pid":"57/4467","text":"Sylvain Peyronnet"}]},"title":"Finding compact communities in large graphs.","venue":"ASONAM","pages":"1457-1464","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/CreusefondLP15","doi":"10.1145/2808797.2808868","ee":"https://doi.org/10.1145/2808797.2808868","url":"https://dblp.org/rec/conf/asunam/CreusefondLP15"}, "url":"URL#3497103" }, { "@score":"1", "@id":"3497104", "info":{"authors":{"author":[{"@pid":"171/2113","text":"Ayushi Dalmia"},{"@pid":"g/ManishGupta1","text":"Manish Gupta 0001"},{"@pid":"03/4045","text":"Vasudeva Varma"}]},"title":"Query-based Graph Cuboid Outlier Detection.","venue":"ASONAM","pages":"705-712","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/DalmiaGV15","doi":"10.1145/2808797.2810061","ee":"https://doi.org/10.1145/2808797.2810061","url":"https://dblp.org/rec/conf/asunam/DalmiaGV15"}, "url":"URL#3497104" }, { "@score":"1", "@id":"3497105", "info":{"authors":{"author":[{"@pid":"119/4529","text":"Anh Dang"},{"@pid":"40/8005","text":"Abidalrahman Moh'd"},{"@pid":"98/552","text":"Anatoliy A. Gruzd"},{"@pid":"m/EvangelosEMilios","text":"Evangelos E. Milios"},{"@pid":"61/4784","text":"Rosane Minghim"}]},"title":"A Visual Framework for Clustering Memes in Social Media.","venue":"ASONAM","pages":"713-720","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/DangMGMM15","doi":"10.1145/2808797.2808830","ee":"https://doi.org/10.1145/2808797.2808830","url":"https://dblp.org/rec/conf/asunam/DangMGMM15"}, "url":"URL#3497105" }, { "@score":"1", "@id":"3497106", "info":{"authors":{"author":[{"@pid":"68/9879","text":"Minh D. Dao"},{"@pid":"171/2217","text":"Akshay Rangamani"},{"@pid":"133/4494","text":"Sang Peter Chin"},{"@pid":"71/8966","text":"Nam P. Nguyen"},{"@pid":"02/565","text":"Trac D. Tran"}]},"title":"Targeted Dot Product Representation for Friend Recommendation in Online Social Networks.","venue":"ASONAM","pages":"349-356","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/DaoRCNT15","doi":"10.1145/2808797.2809414","ee":"https://doi.org/10.1145/2808797.2809414","url":"https://dblp.org/rec/conf/asunam/DaoRCNT15"}, "url":"URL#3497106" }, { "@score":"1", "@id":"3497107", "info":{"authors":{"author":[{"@pid":"147/1114","text":"Pravallika Devineni"},{"@pid":"91/9987","text":"Danai Koutra"},{"@pid":"f/MichalisFaloutsos","text":"Michalis Faloutsos"},{"@pid":"f/CFaloutsos","text":"Christos Faloutsos"}]},"title":"If walls could talk: Patterns and anomalies in Facebook wallposts.","venue":"ASONAM","pages":"367-374","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/DevineniKFF15","doi":"10.1145/2808797.2808880","ee":"https://doi.org/10.1145/2808797.2808880","url":"https://dblp.org/rec/conf/asunam/DevineniKFF15"}, "url":"URL#3497107" }, { "@score":"1", "@id":"3497108", "info":{"authors":{"author":[{"@pid":"95/11513","text":"Ogheneovo Dibie"},{"@pid":"36/4015","text":"Tamara Sumner"}]},"title":"Using weak ties to understand resource usage behaviors in an online community of educators.","venue":"ASONAM","pages":"533-536","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/DibieS15","doi":"10.1145/2808797.2809420","ee":"https://doi.org/10.1145/2808797.2809420","url":"https://dblp.org/rec/conf/asunam/DibieS15"}, "url":"URL#3497108" }, { "@score":"1", "@id":"3497109", "info":{"authors":{"author":[{"@pid":"40/3892","text":"Jana Diesner"},{"@pid":"163/6260","text":"Craig S. Evans"}]},"title":"Little Bad Concerns: Using Sentiment Analysis to Assess Structural Balance in Communication Networks.","venue":"ASONAM","pages":"342-348","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/DiesnerE15","doi":"10.1145/2808797.2809403","ee":"https://doi.org/10.1145/2808797.2809403","url":"https://dblp.org/rec/conf/asunam/DiesnerE15"}, "url":"URL#3497109" }, { "@score":"1", "@id":"3497110", "info":{"authors":{"author":[{"@pid":"45/7498","text":"Nima Dokoohaki"},{"@pid":"171/2140","text":"Filippia Zikou"},{"@pid":"48/5973","text":"Daniel Gillblad"},{"@pid":"m/MihhailMatskin","text":"Mihhail Matskin"}]},"title":"Predicting Swedish Elections with Twitter: A Case for Stochastic Link Structure Analysis.","venue":"ASONAM","pages":"1269-1276","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/DokoohakiZGM15","doi":"10.1145/2808797.2808915","ee":"https://doi.org/10.1145/2808797.2808915","url":"https://dblp.org/rec/conf/asunam/DokoohakiZGM15"}, "url":"URL#3497110" }, { "@score":"1", "@id":"3497111", "info":{"authors":{"author":[{"@pid":"17/9267","text":"Yuxiao Dong"},{"@pid":"124/2323","text":"Reid A. Johnson"},{"@pid":"48/450-8","text":"Yang Yang 0008"},{"@pid":"c/NiteshVChawla","text":"Nitesh V. Chawla"}]},"title":"Collaboration Signatures Reveal Scientific Impact.","venue":"ASONAM","pages":"480-487","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/DongJYC15","doi":"10.1145/2808797.2808846","ee":"https://doi.org/10.1145/2808797.2808846","url":"https://dblp.org/rec/conf/asunam/DongJYC15"}, "url":"URL#3497111" }, { "@score":"1", "@id":"3497112", "info":{"authors":{"author":[{"@pid":"46/4762","text":"Derek Doran"},{"@pid":"168/8662","text":"Samir Yelne"},{"@pid":"73/1670","text":"Luisa Massari"},{"@pid":"99/5681","text":"Mariacarla Calzarossa"},{"@pid":"168/8805","text":"LaTrelle Jackson"},{"@pid":"168/8601","text":"Glen Moriarty"}]},"title":"Stay Awhile and Listen: User Interactions in a Crowdsourced Platform Offering Emotional Support.","venue":"ASONAM","pages":"667-674","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/DoranYMCJM15","doi":"10.1145/2808797.2809311","ee":"https://doi.org/10.1145/2808797.2809311","url":"https://dblp.org/rec/conf/asunam/DoranYMCJM15"}, "url":"URL#3497112" }, { "@score":"1", "@id":"3497113", "info":{"authors":{"author":[{"@pid":"86/4539-1","text":"Nan Du 0001"},{"@pid":"67/4834-4","text":"Jing Gao 0004"},{"@pid":"35/2939","text":"Liang Ge"},{"@pid":"121/4300","text":"Vishrawas Gopalakrishnan"},{"@pid":"118/5304","text":"Xiaowei Jia"},{"@pid":"l/KangLi3","text":"Kang Li 0003"},{"@pid":"z/AidongZhang","text":"Aidong Zhang"}]},"title":"Significant Edge Detection in Target Network by Exploring Multiple Auxiliary Networks.","venue":"ASONAM","pages":"210-217","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/DuGGGJLZ15","doi":"10.1145/2808797.2809302","ee":"https://doi.org/10.1145/2808797.2809302","url":"https://dblp.org/rec/conf/asunam/DuGGGJLZ15"}, "url":"URL#3497113" }, { "@score":"1", "@id":"3497114", "info":{"authors":{"author":[{"@pid":"127/1701","text":"Nicolas Dugué"},{"@pid":"20/1167","text":"Anthony Perez 0001"},{"@pid":"133/8169","text":"Maximilien Danisch"},{"@pid":"171/2121","text":"Florian Bridoux"},{"@pid":"171/2153","text":"Amélie Daviau"},{"@pid":"171/2166","text":"Tennessy Kolubako"},{"@pid":"171/2219","text":"Simon Munier"},{"@pid":"171/2189","text":"Hugo Durbano"}]},"title":"A reliable and evolutive web application to detect social capitalists.","venue":"ASONAM","pages":"741-744","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/DuguePDBDKMD15","doi":"10.1145/2808797.2808799","ee":"https://doi.org/10.1145/2808797.2808799","url":"https://dblp.org/rec/conf/asunam/DuguePDBDKMD15"}, "url":"URL#3497114" }, { "@score":"1", "@id":"3497115", "info":{"authors":{"author":[{"@pid":"133/2631","text":"Hariton Efstathiades"},{"@pid":"165/2077","text":"Demetris Antoniades"},{"@pid":"21/4460","text":"George Pallis 0001"},{"@pid":"06/1702","text":"Marios D. Dikaiakos"}]},"title":"Identification of Key Locations based on Online Social Network Activity.","venue":"ASONAM","pages":"218-225","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/EfstathiadesAPD15","doi":"10.1145/2808797.2808877","ee":"https://doi.org/10.1145/2808797.2808877","url":"https://dblp.org/rec/conf/asunam/EfstathiadesAPD15"}, "url":"URL#3497115" }, { "@score":"1", "@id":"3497116", "info":{"authors":{"author":[{"@pid":"52/5365","text":"Vladimir Estivill-Castro"},{"@pid":"21/708","text":"David F. Nettleton"}]},"title":"Privacy Tips: Would it be ever possible to empower online social-network users to control the confidentiality of their data?","venue":"ASONAM","pages":"1449-1456","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Estivill-Castro15","doi":"10.1145/2808797.2809279","ee":"https://doi.org/10.1145/2808797.2809279","url":"https://dblp.org/rec/conf/asunam/Estivill-Castro15"}, "url":"URL#3497116" }, { "@score":"1", "@id":"3497117", "info":{"authors":{"author":[{"@pid":"162/3288","text":"Issam Falih"},{"@pid":"42/4259","text":"Rushed Kanawati"}]},"title":"MUNA: a Multiplex Network Analysis Library.","venue":"ASONAM","pages":"757-760","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/FalihK15","doi":"10.1145/2808797.2808804","ee":"https://doi.org/10.1145/2808797.2808804","url":"https://dblp.org/rec/conf/asunam/FalihK15"}, "url":"URL#3497117" }, { "@score":"1", "@id":"3497118", "info":{"authors":{"author":[{"@pid":"117/9325","text":"Reza Farahbakhsh"},{"@pid":"76/4893","text":"Ángel Cuevas"},{"@pid":"84/4327","text":"Noël Crespi"}]},"title":"Characterization of Cross-posting Activity for Professional Users Across Major OSNs.","venue":"ASONAM","pages":"645-650","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/FarahbakhshCC15","doi":"10.1145/2808797.2809382","ee":"https://doi.org/10.1145/2808797.2809382","url":"https://dblp.org/rec/conf/asunam/FarahbakhshCC15"}, "url":"URL#3497118" }, { "@score":"1", "@id":"3497119", "info":{"authors":{"author":[{"@pid":"171/2262","text":"Yunping Feng"},{"@pid":"12/414","text":"Di Chen"},{"@pid":"63/9613","text":"Zihao Zhao"},{"@pid":"31/6907","text":"Haopeng Chen"},{"@pid":"171/2126","text":"Puzhao Xi"}]},"title":"The Impact of Students And TAs' Participation on Students' Academic Performance in MOOC.","venue":"ASONAM","pages":"1149-1154","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/FengCZCX15","doi":"10.1145/2808797.2809428","ee":"https://doi.org/10.1145/2808797.2809428","url":"https://dblp.org/rec/conf/asunam/FengCZCX15"}, "url":"URL#3497119" }, { "@score":"1", "@id":"3497120", "info":{"authors":{"author":[{"@pid":"147/3717","text":"Renato Miranda Filho"},{"@pid":"34/5480","text":"Jussara M. Almeida"},{"@pid":"59/701","text":"Gisele L. Pappa"}]},"title":"Twitter Population Sample Bias and its impact on predictive outcomes: a case study on elections.","venue":"ASONAM","pages":"1254-1261","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/FilhoAP15","doi":"10.1145/2808797.2809328","ee":"https://doi.org/10.1145/2808797.2809328","url":"https://dblp.org/rec/conf/asunam/FilhoAP15"}, "url":"URL#3497120" }, { "@score":"1", "@id":"3497121", "info":{"authors":{"author":[{"@pid":"80/9793","text":"Mathilde Forestier"},{"@pid":"171/2168","text":"Jean-Yves Bergier"},{"@pid":"150/3503","text":"Youssef Bouanan"},{"@pid":"69/11064","text":"Judicaël Ribault"},{"@pid":"02/2531","text":"Gregory Zacharewicz"},{"@pid":"28/4118","text":"Bruno Vallespir"},{"@pid":"21/499","text":"Colette Faucher"}]},"title":"Generating Multidimensional Social Network to Simulate the Propagation of Information.","venue":"ASONAM","pages":"1324-1331","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ForestierBBRZVF15","doi":"10.1145/2808797.2808870","ee":"https://doi.org/10.1145/2808797.2808870","url":"https://dblp.org/rec/conf/asunam/ForestierBBRZVF15"}, "url":"URL#3497121" }, { "@score":"1", "@id":"3497122", "info":{"authors":{"author":[{"@pid":"168/4931","text":"Carlos A. Freitas"},{"@pid":"90/2878","text":"Fabrício Benevenuto"},{"@pid":"06/900-1","text":"Saptarshi Ghosh 0001"},{"@pid":"12/919","text":"Adriano Veloso"}]},"title":"Reverse Engineering Socialbot Infiltration Strategies in Twitter.","venue":"ASONAM","pages":"25-32","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/FreitasBGV15","doi":"10.1145/2808797.2809292","ee":"https://doi.org/10.1145/2808797.2809292","url":"https://dblp.org/rec/conf/asunam/FreitasBGV15"}, "url":"URL#3497122" }, { "@score":"1", "@id":"3497123", "info":{"authors":{"author":[{"@pid":"51/1313-1","text":"Christoph Fuchs 0001"},{"@pid":"09/5335","text":"Georg Groh"}]},"title":"Appropriateness of Search Engines, Social Networks, and Directly Approaching Friends to Satisfy Information Needs.","venue":"ASONAM","pages":"1248-1253","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/FuchsG15","doi":"10.1145/2808797.2808836","ee":"https://doi.org/10.1145/2808797.2808836","url":"https://dblp.org/rec/conf/asunam/FuchsG15"}, "url":"URL#3497123" }, { "@score":"1", "@id":"3497124", "info":{"authors":{"author":[{"@pid":"125/3551","text":"Angelo Furno"},{"@pid":"19/10062","text":"Razvan Stanica"},{"@pid":"75/1476","text":"Marco Fiore"}]},"title":"A Comparative Evaluation of Urban Fabric Detection Techniques Based on Mobile Traffic Data.","venue":"ASONAM","pages":"689-696","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/FurnoSF15","doi":"10.1145/2808797.2810057","ee":"https://doi.org/10.1145/2808797.2810057","url":"https://dblp.org/rec/conf/asunam/FurnoSF15"}, "url":"URL#3497124" }, { "@score":"1", "@id":"3497125", "info":{"authors":{"author":[{"@pid":"93/2407-2","text":"Bo Gao 0002"},{"@pid":"b/BettinaBerendt","text":"Bettina Berendt"},{"@pid":"85/5045","text":"Joaquin Vanschoren"}]},"title":"Who is More Positive in Private? Analyzing Sentiment Differences across Privacy Levels and Demographic Factors in Facebook Chats and Posts.","venue":"ASONAM","pages":"605-610","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/GaoBV15","doi":"10.1145/2808797.2809421","ee":"https://doi.org/10.1145/2808797.2809421","url":"https://dblp.org/rec/conf/asunam/GaoBV15"}, "url":"URL#3497125" }, { "@score":"1", "@id":"3497126", "info":{"authors":{"author":[{"@pid":"28/2073-1","text":"Wei Gao 0001"},{"@pid":"s/FabrizioSebastiani","text":"Fabrizio Sebastiani 0001"}]},"title":"Tweet Sentiment: From Classification to Quantification.","venue":"ASONAM","pages":"97-104","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/GaoS15","doi":"10.1145/2808797.2809327","ee":"https://doi.org/10.1145/2808797.2809327","url":"https://dblp.org/rec/conf/asunam/GaoS15"}, "url":"URL#3497126" }, { "@score":"1", "@id":"3497127", "info":{"authors":{"author":[{"@pid":"153/1449","text":"Luc-Aurélien Gauthier"},{"@pid":"15/2146","text":"Benjamin Piwowarski"},{"@pid":"g/PatrickGallinari","text":"Patrick Gallinari"}]},"title":"Leveraging Rating Behavior to Predict Negative Social Ties.","venue":"ASONAM","pages":"623-628","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/GauthierPG15","doi":"10.1145/2808797.2809402","ee":"https://doi.org/10.1145/2808797.2809402","url":"https://dblp.org/rec/conf/asunam/GauthierPG15"}, "url":"URL#3497127" }, { "@score":"1", "@id":"3497128", "info":{"authors":{"author":[{"@pid":"170/7683","text":"Ibrahima Gaye"},{"@pid":"29/11197","text":"Gervais Mendy"},{"@pid":"162/0496","text":"Samuel Ouya"},{"@pid":"55/10296","text":"Diaraf Seck"}]},"title":"Spanning graph for maximizing the influence spread in Social Networks.","venue":"ASONAM","pages":"1389-1394","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/GayeMOS15","doi":"10.1145/2808797.2809309","ee":"https://doi.org/10.1145/2808797.2809309","url":"https://dblp.org/rec/conf/asunam/GayeMOS15"}, "url":"URL#3497128" }, { "@score":"1", "@id":"3497129", "info":{"authors":{"author":[{"@pid":"171/2198","text":"Johanna Geiß"},{"@pid":"135/5777","text":"Andreas Spitz"},{"@pid":"g/MichaelGertz","text":"Michael Gertz 0001"}]},"title":"Beyond Friendships and Followers: The Wikipedia Social Network.","venue":"ASONAM","pages":"472-479","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/GeissSG15","doi":"10.1145/2808797.2808840","ee":"https://doi.org/10.1145/2808797.2808840","url":"https://dblp.org/rec/conf/asunam/GeissSG15"}, "url":"URL#3497129" }, { "@score":"1", "@id":"3497130", "info":{"authors":{"author":[{"@pid":"137/6653","text":"Theodore Georgiou"},{"@pid":"a/AmrElAbbadi","text":"Amr El Abbadi"},{"@pid":"y/XifengYan","text":"Xifeng Yan"},{"@pid":"41/9183","text":"Jemin George"}]},"title":"Mining Complaints for Traffic-Jam Estimation: A Social Sensor Application.","venue":"ASONAM","pages":"330-335","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/GeorgiouAYG15","doi":"10.1145/2808797.2809404","ee":"https://doi.org/10.1145/2808797.2809404","url":"https://dblp.org/rec/conf/asunam/GeorgiouAYG15"}, "url":"URL#3497130" }, { "@score":"1", "@id":"3497131", "info":{"authors":{"author":[{"@pid":"159/7426","text":"Andrew Ghobrial"},{"@pid":"39/10916","text":"Jacob W. Bartel"},{"@pid":"164/5053","text":"Andrew Vitkus"},{"@pid":"d/PrasunDewan","text":"Prasun Dewan"}]},"title":"A Test-Bed for Generating Social Graphs and Recommending Named Groups from Email.","venue":"ASONAM","pages":"745-748","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/GhobrialBVD15","doi":"10.1145/2808797.2808800","ee":"https://doi.org/10.1145/2808797.2808800","url":"https://dblp.org/rec/conf/asunam/GhobrialBVD15"}, "url":"URL#3497131" }, { "@score":"1", "@id":"3497132", "info":{"authors":{"author":[{"@pid":"43/7360","text":"Tilman Göhnert"},{"@pid":"67/3524","text":"Sabrina Ziebarth"},{"@pid":"169/5285","text":"Henrik Detjen"},{"@pid":"125/4121","text":"Tobias Hecking"},{"@pid":"h/HeinzUlrichHoppe","text":"Heinz Ulrich Hoppe"}]},"title":"3D DynNetVis: A 3D Visualization Technique for Dynamic Networks.","venue":"ASONAM","pages":"737-740","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/GohnertZDHH15","doi":"10.1145/2808797.2808798","ee":"https://doi.org/10.1145/2808797.2808798","url":"https://dblp.org/rec/conf/asunam/GohnertZDHH15"}, "url":"URL#3497132" }, { "@score":"1", "@id":"3497133", "info":{"authors":{"author":[{"@pid":"171/2208","text":"Mehmet Gök"},{"@pid":"16/6917","text":"Tansel Özyer"},{"@pid":"21/8200","text":"Jamal Jida"}]},"title":"A Case Study for the Churn Prediction in Turksat Internet Service Subscription.","venue":"ASONAM","pages":"1220-1224","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/GokOJ15","doi":"10.1145/2808797.2808821","ee":"https://doi.org/10.1145/2808797.2808821","url":"https://dblp.org/rec/conf/asunam/GokOJ15"}, "url":"URL#3497133" }, { "@score":"1", "@id":"3497134", "info":{"authors":{"author":[{"@pid":"127/0397","text":"Nikou Günnemann"},{"@pid":"25/11207","text":"Jürgen Pfeffer"}]},"title":"Finding Non-Redundant Multi-Word Events on Twitter.","venue":"ASONAM","pages":"520-525","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/GunnemannP15","doi":"10.1145/2808797.2809390","ee":"https://doi.org/10.1145/2808797.2809390","url":"https://dblp.org/rec/conf/asunam/GunnemannP15"}, "url":"URL#3497134" }, { "@score":"1", "@id":"3497135", "info":{"authors":{"author":[{"@pid":"167/4378","text":"Ruocheng Guo"},{"@pid":"159/7179","text":"Elham Shaabani"},{"@pid":"167/3925","text":"Abhinav Bhatnagar"},{"@pid":"73/8292","text":"Paulo Shakarian"}]},"title":"Toward Order-of-Magnitude Cascade Prediction.","venue":"ASONAM","pages":"1610-1613","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/GuoSBS15","doi":"10.1145/2808797.2809358","ee":"https://doi.org/10.1145/2808797.2809358","url":"https://dblp.org/rec/conf/asunam/GuoSBS15"}, "url":"URL#3497135" }, { "@score":"1", "@id":"3497136", "info":{"authors":{"author":[{"@pid":"10/8243","text":"Wentao Han"},{"@pid":"141/8790","text":"Xiaowei Zhu"},{"@pid":"171/2199","text":"Ziyan Zhu"},{"@pid":"60/810","text":"Wenguang Chen"},{"@pid":"45/6990","text":"Weimin Zheng"},{"@pid":"52/6415","text":"Jianguo Lu"}]},"title":"Weibo, and a Tale of Two Worlds.","venue":"ASONAM","pages":"121-128","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/HanZZCZL15","doi":"10.1145/2808797.2809333","ee":"https://doi.org/10.1145/2808797.2809333","url":"https://dblp.org/rec/conf/asunam/HanZZCZL15"}, "url":"URL#3497136" }, { "@score":"1", "@id":"3497137", "info":{"authors":{"author":[{"@pid":"171/2147","text":"Nichole Hanus"},{"@pid":"171/2265","text":"Mitchell Small"},{"@pid":"171/2129","text":"Gabrielle Wong-Parodi"},{"@pid":"171/2266","text":"Iris Grossmann"}]},"title":"Leveraging Pittsburgh's Energy Efficiency Social Network to Predict Next Adopters.","venue":"ASONAM","pages":"920-921","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/HanusSWG15","doi":"10.1145/2808797.2809430","ee":"https://doi.org/10.1145/2808797.2809430","url":"https://dblp.org/rec/conf/asunam/HanusSWG15"}, "url":"URL#3497137" }, { "@score":"1", "@id":"3497138", "info":{"authors":{"author":[{"@pid":"171/2133","text":"Jimpei Harada"},{"@pid":"131/6634","text":"David Darmon"},{"@pid":"131/6632","text":"Michelle Girvan"},{"@pid":"07/5760","text":"William Rand"}]},"title":"Forecasting High Tide: Predicting Times of Elevated Activity in Online Social Media.","venue":"ASONAM","pages":"504-507","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/HaradaDGR15","doi":"10.1145/2808797.2809392","ee":"https://doi.org/10.1145/2808797.2809392","url":"https://dblp.org/rec/conf/asunam/HaradaDGR15"}, "url":"URL#3497138" }, { "@score":"1", "@id":"3497139", "info":{"authors":{"author":[{"@pid":"95/8308","text":"Ilire Hasani-Mavriqi"},{"@pid":"150/8791","text":"Florian Geigl"},{"@pid":"170/8391","text":"Subhash Chandra Pujari"},{"@pid":"88/6931","text":"Elisabeth Lex"},{"@pid":"11/6129","text":"Denis Helic"}]},"title":"The Influence of Social Status on Consensus Building in Collaboration Networks.","venue":"ASONAM","pages":"162-169","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Hasani-MavriqiG15","doi":"10.1145/2808797.2808887","ee":"https://doi.org/10.1145/2808797.2808887","url":"https://dblp.org/rec/conf/asunam/Hasani-MavriqiG15"}, "url":"URL#3497139" }, { "@score":"1", "@id":"3497140", "info":{"authors":{"author":[{"@pid":"125/4121","text":"Tobias Hecking"},{"@pid":"h/HeinzUlrichHoppe","text":"Heinz Ulrich Hoppe"},{"@pid":"h/AndreasHarrer","text":"Andreas Harrer"}]},"title":"Uncovering the Structure of Knowledge Exchange in a MOOC Discussion Forum.","venue":"ASONAM","pages":"1614-1615","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/HeckingHH15","doi":"10.1145/2808797.2809359","ee":"https://doi.org/10.1145/2808797.2809359","url":"https://dblp.org/rec/conf/asunam/HeckingHH15"}, "url":"URL#3497140" }, { "@score":"1", "@id":"3497141", "info":{"authors":{"author":[{"@pid":"58/4310","text":"Nic Herndon"},{"@pid":"40/2098","text":"Doina Caragea"}]},"title":"An Evaluation of Self-training Styles for Domain Adaptation on the Task of Splice Site Prediction.","venue":"ASONAM","pages":"1042-1047","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/HerndonC15","doi":"10.1145/2808797.2808809","ee":"https://doi.org/10.1145/2808797.2808809","url":"https://dblp.org/rec/conf/asunam/HerndonC15"}, "url":"URL#3497141" }, { "@score":"1", "@id":"3497142", "info":{"authors":{"author":[{"@pid":"125/5041","text":"Emoke-Ágnes Horvát"},{"@pid":"171/2144","text":"Jayaram Uparna"},{"@pid":"59/7884","text":"Brian Uzzi"}]},"title":"Network vs Market Relations: The Effect of Friends in Crowdfunding.","venue":"ASONAM","pages":"226-233","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/HorvatUU15","doi":"10.1145/2808797.2808904","ee":"https://doi.org/10.1145/2808797.2808904","url":"https://dblp.org/rec/conf/asunam/HorvatUU15"}, "url":"URL#3497142" }, { "@score":"1", "@id":"3497143", "info":{"authors":{"author":[{"@pid":"31/1852","text":"Dimitar Hristovski"},{"@pid":"87/8040","text":"Andrej Kastrin"},{"@pid":"83/1630","text":"Thomas C. Rindflesch"}]},"title":"Semantics-Based Cross-domain Collaboration Recommendation in the Life Sciences: Preliminary Results.","venue":"ASONAM","pages":"805-806","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/HristovskiKR15","doi":"10.1145/2808797.2809300","ee":"https://doi.org/10.1145/2808797.2809300","url":"https://dblp.org/rec/conf/asunam/HristovskiKR15"}, "url":"URL#3497143" }, { "@score":"1", "@id":"3497144", "info":{"authors":{"author":[{"@pid":"151/4061","text":"Ta Yuan Hsu"},{"@pid":"96/6394","text":"Ajay D. Kshemkalyani"}]},"title":"Modeling Social Network Topology with Variable Social Vector Clocks.","venue":"ASONAM","pages":"584-589","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/HsuK15","doi":"10.1145/2808797.2809405","ee":"https://doi.org/10.1145/2808797.2809405","url":"https://dblp.org/rec/conf/asunam/HsuK15"}, "url":"URL#3497144" }, { "@score":"1", "@id":"3497145", "info":{"authors":{"author":[{"@pid":"86/2778","text":"Neil J. Hurley"},{"@pid":"133/3681","text":"Erika Duriakova"}]},"title":"Reformulations of the Map Equation for Community Finding and Blockmodelling.","venue":"ASONAM","pages":"1606-1607","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/HurleyD15","doi":"10.1145/2808797.2809356","ee":"https://doi.org/10.1145/2808797.2809356","url":"https://dblp.org/rec/conf/asunam/HurleyD15"}, "url":"URL#3497145" }, { "@score":"1", "@id":"3497146", "info":{"authors":{"author":[{"@pid":"49/9854","text":"Nagehan Ilhan"},{"@pid":"16/6911","text":"Sule Gündüz Ögüdücü"}]},"title":"Predicting Community Evolution based on Time Series Modeling.","venue":"ASONAM","pages":"1509-1516","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/IlhanO15","doi":"10.1145/2808797.2808913","ee":"https://doi.org/10.1145/2808797.2808913","url":"https://dblp.org/rec/conf/asunam/IlhanO15"}, "url":"URL#3497146" }, { "@score":"1", "@id":"3497147", "info":{"authors":{"author":[{"@pid":"135/5203","text":"Roberto Interdonato"},{"@pid":"153/8315","text":"Chiara Pulice"},{"@pid":"t/AndreaTagarelli","text":"Andrea Tagarelli"}]},"title":""Got to have faith!": The DEvOTION algorithm for delurking in social networks.","venue":"ASONAM","pages":"314-319","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/InterdonatoPT15","doi":"10.1145/2808797.2809394","ee":"https://doi.org/10.1145/2808797.2809394","url":"https://dblp.org/rec/conf/asunam/InterdonatoPT15"}, "url":"URL#3497147" }, { "@score":"1", "@id":"3497148", "info":{"authors":{"author":[{"@pid":"117/3627","text":"Haruna Isah"},{"@pid":"65/1947","text":"Daniel Neagu"},{"@pid":"41/1508","text":"Paul R. Trundle"}]},"title":"Bipartite Network Model for Inferring Hidden Ties in Crime Data.","venue":"ASONAM","pages":"994-1001","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/IsahNT15","doi":"10.1145/2808797.2808842","ee":"https://doi.org/10.1145/2808797.2808842","url":"https://dblp.org/rec/conf/asunam/IsahNT15"}, "url":"URL#3497148" }, { "@score":"1", "@id":"3497149", "info":{"authors":{"author":[{"@pid":"171/2192","text":"Omar Jaafor"},{"@pid":"44/2755","text":"Babiga Birregah"}]},"title":"Multi-layered graph-based model for social engineering vulnerability assessment.","venue":"ASONAM","pages":"1480-1488","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/JaaforB15","doi":"10.1145/2808797.2808899","ee":"https://doi.org/10.1145/2808797.2808899","url":"https://dblp.org/rec/conf/asunam/JaaforB15"}, "url":"URL#3497149" }, { "@score":"1", "@id":"3497150", "info":{"authors":{"author":[{"@pid":"31/1701","text":"Gwan Jang"},{"@pid":"50/3334","text":"Sung-Hyon Myaeng"}]},"title":"Analysis of Spatially Oriented Topic Versatility over Time on Social Media.","venue":"ASONAM","pages":"573-578","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/JangM15","doi":"10.1145/2808797.2809378","ee":"https://doi.org/10.1145/2808797.2809378","url":"https://dblp.org/rec/conf/asunam/JangM15"}, "url":"URL#3497150" }, { "@score":"1", "@id":"3497151", "info":{"authors":{"author":[{"@pid":"171/2139","text":"Mujtaba Jawed"},{"@pid":"30/1062","text":"Mehmet Kaya"},{"@pid":"78/11148","text":"Reda Alhajj"}]},"title":"Time Frame based Link Prediction in Directed Citation Networks.","venue":"ASONAM","pages":"1162-1168","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/JawedKA15","doi":"10.1145/2808797.2809323","ee":"https://doi.org/10.1145/2808797.2809323","url":"https://dblp.org/rec/conf/asunam/JawedKA15"}, "url":"URL#3497151" }, { "@score":"1", "@id":"3497152", "info":{"authors":{"author":[{"@pid":"131/5953","text":"Kasthuri Jayarajah"},{"@pid":"24/4570","text":"Archan Misra"},{"@pid":"152/4871","text":"Xiao Wen Ruan"},{"@pid":"l/EePengLim","text":"Ee-Peng Lim"}]},"title":"Event Detection: Exploiting Socio-Physical Interactions in Physical Spaces.","venue":"ASONAM","pages":"508-513","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/JayarajahMRL15","doi":"10.1145/2808797.2809387","ee":"https://doi.org/10.1145/2808797.2809387","url":"https://dblp.org/rec/conf/asunam/JayarajahMRL15"}, "url":"URL#3497152" }, { "@score":"1", "@id":"3497153", "info":{"authors":{"author":[{"@pid":"90/11080","text":"Byungkyu Kang"},{"@pid":"h/TobiasHollerer","text":"Tobias Höllerer"},{"@pid":"59/6213","text":"John O'Donovan"}]},"title":"Believe it or Not? Analyzing Information Credibility in Microblogs.","venue":"ASONAM","pages":"611-616","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/KangHO15","doi":"10.1145/2808797.2809379","ee":"https://doi.org/10.1145/2808797.2809379","url":"https://dblp.org/rec/conf/asunam/KangHO15"}, "url":"URL#3497153" }, { "@score":"1", "@id":"3497154", "info":{"authors":{"author":[{"@pid":"90/11080","text":"Byungkyu Kang"},{"@pid":"h/TobiasHollerer","text":"Tobias Höllerer"},{"@pid":"59/6213","text":"John O'Donovan"}]},"title":"The Full Story: Automatic detection of unique news content in Microblogs.","venue":"ASONAM","pages":"1192-1199","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/KangHO15a","doi":"10.1145/2808797.2809317","ee":"https://doi.org/10.1145/2808797.2809317","url":"https://dblp.org/rec/conf/asunam/KangHO15a"}, "url":"URL#3497154" }, { "@score":"1", "@id":"3497155", "info":{"authors":{"author":[{"@pid":"130/5771","text":"Dharshana Kasthurirathna"},{"@pid":"37/8393","text":"Michael Harré"},{"@pid":"m/PiraveenanMahendra","text":"Mahendra Piraveenan"}]},"title":"Influence modelling using bounded rationality in social networks.","venue":"ASONAM","pages":"33-40","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/KasthurirathnaH15","doi":"10.1145/2808797.2808886","ee":"https://doi.org/10.1145/2808797.2808886","url":"https://dblp.org/rec/conf/asunam/KasthurirathnaH15"}, "url":"URL#3497155" }, { "@score":"1", "@id":"3497156", "info":{"authors":{"author":[{"@pid":"132/5194","text":"Buket Kaya"},{"@pid":"53/2897","text":"Mustafa Poyraz"}]},"title":"Finding Relations Between Diseases by Age-Series Based Supervised Link Prediction.","venue":"ASONAM","pages":"1097-1103","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/KayaP15","doi":"10.1145/2808797.2808812","ee":"https://doi.org/10.1145/2808797.2808812","url":"https://dblp.org/rec/conf/asunam/KayaP15"}, "url":"URL#3497156" }, { "@score":"1", "@id":"3497157", "info":{"authors":{"author":[{"@pid":"04/9461","text":"Md. Imrul Kayes"},{"@pid":"96/8779","text":"Nicolas Kourtellis"},{"@pid":"b/FBonchi","text":"Francesco Bonchi"},{"@pid":"33/5916","text":"Adriana Iamnitchi"}]},"title":"Privacy Concerns vs. User Behavior in Community Question Answering.","venue":"ASONAM","pages":"681-688","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/KayesKBI15","doi":"10.1145/2808797.2809422","ee":"https://doi.org/10.1145/2808797.2809422","url":"https://dblp.org/rec/conf/asunam/KayesKBI15"}, "url":"URL#3497157" }, { "@score":"1", "@id":"3497158", "info":{"authors":{"author":{"@pid":"03/5646","text":"Richard Khoury"}},"title":"Phonetic Normalization of Microtext.","venue":"ASONAM","pages":"1600-1601","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Khoury15","doi":"10.1145/2808797.2809352","ee":"https://doi.org/10.1145/2808797.2809352","url":"https://dblp.org/rec/conf/asunam/Khoury15"}, "url":"URL#3497158" }, { "@score":"1", "@id":"3497159", "info":{"authors":{"author":[{"@pid":"126/7649","text":"Mark Kibanov"},{"@pid":"22/4732","text":"Martin Atzmueller"},{"@pid":"57/10573","text":"Jens Illig"},{"@pid":"66/1002-1","text":"Christoph Scholz 0001"},{"@pid":"67/3434","text":"Alain Barrat"},{"@pid":"42/5539","text":"Ciro Cattuto"},{"@pid":"s/GerdStumme","text":"Gerd Stumme"}]},"title":"Is Web Content a Good Proxy for Real-Life Interaction?: A Case Study Considering Online and Offline Interactions of Computer Scientists.","venue":"ASONAM","pages":"697-704","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/KibanovAI0BCS15","doi":"10.1145/2808797.2810060","ee":"https://doi.org/10.1145/2808797.2810060","url":"https://dblp.org/rec/conf/asunam/KibanovAI0BCS15"}, "url":"URL#3497159" }, { "@score":"1", "@id":"3497160", "info":{"authors":{"author":[{"@pid":"171/2221","text":"Jannis Koch"},{"@pid":"28/8030","text":"Christian L. Staudt"},{"@pid":"171/2288","text":"Maximilian Vogel"},{"@pid":"55/3065","text":"Henning Meyerhenke"}]},"title":"Complex Network Analysis on Distributed Systems: An Empirical Comparison.","venue":"ASONAM","pages":"1169-1176","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/KochSVM15","doi":"10.1145/2808797.2808923","ee":"https://doi.org/10.1145/2808797.2808923","url":"https://dblp.org/rec/conf/asunam/KochSVM15"}, "url":"URL#3497160" }, { "@score":"1", "@id":"3497161", "info":{"authors":{"author":[{"@pid":"142/2598","text":"Gizem Korkmaz"},{"@pid":"142/2674","text":"Jose Cadena"},{"@pid":"09/7561","text":"Chris J. Kuhlman"},{"@pid":"39/5994","text":"Achla Marathe"},{"@pid":"89/7912","text":"Anil Vullikanti"},{"@pid":"r/NarenRamakrishnan","text":"Naren Ramakrishnan"}]},"title":"Combining Heterogeneous Data Sources for Civil Unrest Forecasting.","venue":"ASONAM","pages":"258-265","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/KorkmazCKMVR15","doi":"10.1145/2808797.2808847","ee":"https://doi.org/10.1145/2808797.2808847","url":"https://dblp.org/rec/conf/asunam/KorkmazCKMVR15"}, "url":"URL#3497161" }, { "@score":"1", "@id":"3497162", "info":{"authors":{"author":[{"@pid":"171/2135","text":"Rostyslav Korolov"},{"@pid":"161/0054","text":"Justin Peabody"},{"@pid":"56/8397","text":"Allen Lavoie"},{"@pid":"30/2277","text":"Sanmay Das"},{"@pid":"53/1994","text":"Malik Magdon-Ismail"},{"@pid":"27/4731","text":"William A. Wallace"}]},"title":"Actions Are Louder than Words in Social Media.","venue":"ASONAM","pages":"292-297","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/KorolovPLDMW15","doi":"10.1145/2808797.2809376","ee":"https://doi.org/10.1145/2808797.2809376","url":"https://dblp.org/rec/conf/asunam/KorolovPLDMW15"}, "url":"URL#3497162" }, { "@score":"1", "@id":"3497163", "info":{"authors":{"author":[{"@pid":"171/2282","text":"Anna Kowalska-Pyzalska"},{"@pid":"171/2184","text":"Katarzyna Maciejowska"},{"@pid":"92/2528","text":"Rafal Weron"},{"@pid":"121/4857","text":"Katarzyna Sznajd-Weron"}]},"title":"Diffusion and adoption of dynamic electricity tariffs: An agent-based modeling approach.","venue":"ASONAM","pages":"1277-1283","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Kowalska-Pyzalska15","doi":"10.1145/2808797.2808859","ee":"https://doi.org/10.1145/2808797.2808859","url":"https://dblp.org/rec/conf/asunam/Kowalska-Pyzalska15"}, "url":"URL#3497163" }, { "@score":"1", "@id":"3497164", "info":{"authors":{"author":[{"@pid":"25/7975","text":"Shamanth Kumar"},{"@pid":"92/309-1","text":"Huan Liu 0001"},{"@pid":"91/877","text":"Sameep Mehta"},{"@pid":"s/LVenkataSubramaniam","text":"L. Venkata Subramaniam"}]},"title":"Exploring a Scalable Solution to Identifying Events in Noisy Twitter Streams.","venue":"ASONAM","pages":"496-499","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/KumarLMS15","doi":"10.1145/2808797.2809389","ee":"https://doi.org/10.1145/2808797.2809389","url":"https://dblp.org/rec/conf/asunam/KumarLMS15"}, "url":"URL#3497164" }, { "@score":"1", "@id":"3497165", "info":{"authors":{"author":[{"@pid":"166/1590","text":"Zhana Kuncheva"},{"@pid":"89/449","text":"Giovanni Montana"}]},"title":"Community Detection in Multiplex Networks using Locally Adaptive Random Walks.","venue":"ASONAM","pages":"1308-1315","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/KunchevaM15","doi":"10.1145/2808797.2808852","ee":"https://doi.org/10.1145/2808797.2808852","url":"https://dblp.org/rec/conf/asunam/KunchevaM15"}, "url":"URL#3497165" }, { "@score":"1", "@id":"3497166", "info":{"authors":{"author":[{"@pid":"08/4","text":"Kee-Young Kwahk"},{"@pid":"77/4798-4","text":"Eun-Young Kang 0004"}]},"title":"Management of duplicate members on websites.","venue":"ASONAM","pages":"1104-1109","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/KwahkK15","doi":"10.1145/2808797.2808815","ee":"https://doi.org/10.1145/2808797.2808815","url":"https://dblp.org/rec/conf/asunam/KwahkK15"}, "url":"URL#3497166" }, { "@score":"1", "@id":"3497167", "info":{"authors":{"author":[{"@pid":"146/9491","text":"Sudhir B. Kylasa"},{"@pid":"66/2536","text":"Giorgios Kollias"},{"@pid":"g/AnanthGrama","text":"Ananth Grama"}]},"title":"Social ties and checkin sites: Connections and latent structures in Location Based Social Networks.","venue":"ASONAM","pages":"194-201","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/KylasaKG15","doi":"10.1145/2808797.2809308","ee":"https://doi.org/10.1145/2808797.2809308","url":"https://dblp.org/rec/conf/asunam/KylasaKG15"}, "url":"URL#3497167" }, { "@score":"1", "@id":"3497168", "info":{"authors":{"author":[{"@pid":"120/8503","text":"Hemank Lamba"},{"@pid":"171/2245","text":"Momin M. Malik"},{"@pid":"25/11207","text":"Jürgen Pfeffer"}]},"title":"A Tempest in a Teacup? Analyzing Firestorms on Twitter.","venue":"ASONAM","pages":"17-24","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/LambaMP15","doi":"10.1145/2808797.2808828","ee":"https://doi.org/10.1145/2808797.2808828","url":"https://dblp.org/rec/conf/asunam/LambaMP15"}, "url":"URL#3497168" }, { "@score":"1", "@id":"3497169", "info":{"authors":{"author":[{"@pid":"28/4095","text":"Sylvain Lamprier"},{"@pid":"139/0775","text":"Simon Bourigault"},{"@pid":"g/PatrickGallinari","text":"Patrick Gallinari"}]},"title":"Extracting Diffusion Channels from Real-World Social Data: a Delay-Agnostic Learning of Transmission Probabilities.","venue":"ASONAM","pages":"178-185","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/LamprierBG15","doi":"10.1145/2808797.2808865","ee":"https://doi.org/10.1145/2808797.2808865","url":"https://dblp.org/rec/conf/asunam/LamprierBG15"}, "url":"URL#3497169" }, { "@score":"1", "@id":"3497170", "info":{"authors":{"author":[{"@pid":"65/7982","text":"Kathy Lee"},{"@pid":"55/5176-1","text":"Ankit Agrawal 0001"},{"@pid":"c/AlokNChoudhary","text":"Alok N. Choudhary"}]},"title":"Mining Social Media Streams to Improve Public Health Allergy Surveillance.","venue":"ASONAM","pages":"815-822","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/LeeAC15","doi":"10.1145/2808797.2808896","ee":"https://doi.org/10.1145/2808797.2808896","url":"https://dblp.org/rec/conf/asunam/LeeAC15"}, "url":"URL#3497170" }, { "@score":"1", "@id":"3497171", "info":{"authors":{"author":[{"@pid":"47/534","text":"Chung-Hong Lee"},{"@pid":"39/316","text":"Hsin-Chang Yang"},{"@pid":"171/2252","text":"Shih-Jan Lin"}]},"title":"Incorporating Big Data and Social Sensors in a Novel Early Warning System of Dengue Outbreaks.","venue":"ASONAM","pages":"1428-1433","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/LeeYL15","doi":"10.1145/2808797.2808883","ee":"https://doi.org/10.1145/2808797.2808883","url":"https://dblp.org/rec/conf/asunam/LeeYL15"}, "url":"URL#3497171" }, { "@score":"1", "@id":"3497172", "info":{"authors":{"author":[{"@pid":"171/2231","text":"Ioanna K. Lekea"},{"@pid":"54/1245","text":"Panagiotis Karampelas"},{"@pid":"147/3334","text":"Konstantinos F. Xylogiannopoulos"},{"@pid":"78/11148","text":"Reda Alhajj"}]},"title":"Tactics, weapons, targets and rationale behind the actions of the mostly operational terrorist groups across Europe.","venue":"ASONAM","pages":"1010-1016","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/LekeaKXA15","doi":"10.1145/2808797.2809314","ee":"https://doi.org/10.1145/2808797.2809314","url":"https://dblp.org/rec/conf/asunam/LekeaKXA15"}, "url":"URL#3497172" }, { "@score":"1", "@id":"3497173", "info":{"authors":{"author":[{"@pid":"171/2127","text":"Victor Lequay"},{"@pid":"171/2124","text":"Alexis Ringot"},{"@pid":"62/7264","text":"Mohammed Haddad 0001"},{"@pid":"78/5429","text":"Brice Effantin"},{"@pid":"99/6650","text":"Hamamache Kheddouci"}]},"title":"GraphExploiter: Creation, Visualization and Algorithms on graphs.","venue":"ASONAM","pages":"765-767","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/LequayRHEK15","doi":"10.1145/2808797.2808803","ee":"https://doi.org/10.1145/2808797.2808803","url":"https://dblp.org/rec/conf/asunam/LequayRHEK15"}, "url":"URL#3497173" }, { "@score":"1", "@id":"3497174", "info":{"authors":{"author":[{"@pid":"17/5705-31","text":"Hao Li 0031"},{"@pid":"61/2408","text":"Heng Ji"},{"@pid":"72/2195","text":"Lin Zhao"}]},"title":"Social Event Extraction: Task, Challenges and Techniques.","venue":"ASONAM","pages":"526-532","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/LiJZ15","doi":"10.1145/2808797.2809413","ee":"https://doi.org/10.1145/2808797.2809413","url":"https://dblp.org/rec/conf/asunam/LiJZ15"}, "url":"URL#3497174" }, { "@score":"1", "@id":"3497175", "info":{"authors":{"author":[{"@pid":"171/2234","text":"Shiou-Chi Li"},{"@pid":"171/2167","text":"Yu-Hao Ke"},{"@pid":"171/2130","text":"Fa-Yuan Liu"},{"@pid":"29/5543","text":"Jen-Wei Huang"}]},"title":"Reconstructing Dynamic Social Network by Choosing Local Maximum Degree Substitute.","venue":"ASONAM","pages":"1604-1605","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/LiKLH15","doi":"10.1145/2808797.2809355","ee":"https://doi.org/10.1145/2808797.2809355","url":"https://dblp.org/rec/conf/asunam/LiKLH15"}, "url":"URL#3497175" }, { "@score":"1", "@id":"3497176", "info":{"authors":{"author":[{"@pid":"144/1464","text":"Cong Liao"},{"@pid":"s/AnnaCinziaSquicciarini","text":"Anna Cinzia Squicciarini"},{"@pid":"36/3318","text":"Christopher Griffin 0001"},{"@pid":"42/8717","text":"Sarah Michele Rajtmajer"}]},"title":"A Hybrid Epidemic Model for Antinormative Behavior in Online Social Networks.","venue":"ASONAM","pages":"1563-1564","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/LiaoSGR15","doi":"10.1145/2808797.2809334","ee":"https://doi.org/10.1145/2808797.2809334","url":"https://dblp.org/rec/conf/asunam/LiaoSGR15"}, "url":"URL#3497176" }, { "@score":"1", "@id":"3497177", "info":{"authors":{"author":[{"@pid":"166/1567","text":"Bang Hui Lim"},{"@pid":"73/8382","text":"Dongyuan Lu"},{"@pid":"69/510-8","text":"Tao Chen 0008"},{"@pid":"k/MinYenKan","text":"Min-Yen Kan"}]},"title":"#mytweet via Instagram: Exploring User Behaviour across Multiple Social Networks.","venue":"ASONAM","pages":"113-120","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/LimLCK15","doi":"10.1145/2808797.2808820","ee":"https://doi.org/10.1145/2808797.2808820","url":"https://dblp.org/rec/conf/asunam/LimLCK15"}, "url":"URL#3497177" }, { "@score":"1", "@id":"3497178", "info":{"authors":{"author":[{"@pid":"140/8178","text":"Yishi Lin"},{"@pid":"42/3145","text":"Xiaowei Chen"},{"@pid":"l/JohnCSLui","text":"John C. S. Lui"}]},"title":"I/O Efficient Algorithms for Exact Distance Queries on Disk-Resident Dynamic Graphs.","venue":"ASONAM","pages":"440-447","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/LinCL15","doi":"10.1145/2808797.2808876","ee":"https://doi.org/10.1145/2808797.2808876","url":"https://dblp.org/rec/conf/asunam/LinCL15"}, "url":"URL#3497178" }, { "@score":"1", "@id":"3497179", "info":{"authors":{"author":[{"@pid":"40/991","text":"Gerd Lindner"},{"@pid":"28/8030","text":"Christian L. Staudt"},{"@pid":"128/3534","text":"Michael Hamann"},{"@pid":"55/3065","text":"Henning Meyerhenke"},{"@pid":"w/DorotheaWagner","text":"Dorothea Wagner"}]},"title":"Structure-Preserving Sparsification of Social Networks.","venue":"ASONAM","pages":"448-454","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/LindnerSHMW15","doi":"10.1145/2808797.2809313","ee":"https://doi.org/10.1145/2808797.2809313","url":"https://dblp.org/rec/conf/asunam/LindnerSHMW15"}, "url":"URL#3497179" }, { "@score":"1", "@id":"3497180", "info":{"authors":{"author":[{"@pid":"46/4291","text":"Jiamou Liu"},{"@pid":"167/9607","text":"Anastasia Moskvina"}]},"title":"Hierarchies, Ties and Power in Organisational Networks: Model and Analysis.","venue":"ASONAM","pages":"202-209","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/LiuM15","doi":"10.1145/2808797.2808874","ee":"https://doi.org/10.1145/2808797.2808874","url":"https://dblp.org/rec/conf/asunam/LiuM15"}, "url":"URL#3497180" }, { "@score":"1", "@id":"3497181", "info":{"authors":{"author":{"@pid":"74/3704","text":"Zvi Lotker"}},"title":"Voting algorithm in the play Julius Caesar.","venue":"ASONAM","pages":"848-855","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Lotker15","doi":"10.1145/2808797.2810064","ee":"https://doi.org/10.1145/2808797.2810064","url":"https://dblp.org/rec/conf/asunam/Lotker15"}, "url":"URL#3497181" }, { "@score":"1", "@id":"3497182", "info":{"authors":{"author":[{"@pid":"l/MarkusLuczakRosch","text":"Markus Luczak-Rösch"},{"@pid":"41/11206","text":"Ramine Tinati"},{"@pid":"59/1825","text":"Max Van Kleek"},{"@pid":"s/NigelShadbolt","text":"Nigel Shadbolt"}]},"title":"From Coincidence to Purposeful Flow? Properties of Transcendental Information Cascades.","venue":"ASONAM","pages":"633-638","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Luczak-RoschTKS15","doi":"10.1145/2808797.2809393","ee":"https://doi.org/10.1145/2808797.2809393","url":"https://dblp.org/rec/conf/asunam/Luczak-RoschTKS15"}, "url":"URL#3497182" }, { "@score":"1", "@id":"3497183", "info":{"authors":{"author":[{"@pid":"57/11267","text":"Wuqiong Luo"},{"@pid":"45/3753","text":"Wee-Peng Tay"},{"@pid":"08/8335","text":"Mei Leng"}]},"title":"Rumor Spreading Maximization and Source Identification in a Social Network.","venue":"ASONAM","pages":"186-193","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/LuoTL15","doi":"10.1145/2808797.2809298","ee":"https://doi.org/10.1145/2808797.2809298","url":"https://dblp.org/rec/conf/asunam/LuoTL15"}, "url":"URL#3497183" }, { "@score":"1", "@id":"3497184", "info":{"authors":{"author":[{"@pid":"171/2115","text":"Mitch Macdonald"},{"@pid":"71/6909","text":"Richard Frank"},{"@pid":"171/2136","text":"Joseph Mei"},{"@pid":"165/9312","text":"Bryan Monk"}]},"title":"Identifying Digital Threats in a Hacker Web Forum.","venue":"ASONAM","pages":"926-933","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/MacdonaldFMM15","doi":"10.1145/2808797.2808878","ee":"https://doi.org/10.1145/2808797.2808878","url":"https://dblp.org/rec/conf/asunam/MacdonaldFMM15"}, "url":"URL#3497184" }, { "@score":"1", "@id":"3497185", "info":{"authors":{"author":[{"@pid":"01/11105","text":"Charisse R. Madlock-Brown"},{"@pid":"e/DEichmann","text":"David Eichmann"}]},"title":"Assessing the Translational Capacity of Five CTSA Institutions.","venue":"ASONAM","pages":"768-769","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Madlock-BrownE15","doi":"10.1145/2808797.2808838","ee":"https://doi.org/10.1145/2808797.2808838","url":"https://dblp.org/rec/conf/asunam/Madlock-BrownE15"}, "url":"URL#3497185" }, { "@score":"1", "@id":"3497186", "info":{"authors":{"author":[{"@pid":"40/4437","text":"Clémence Magnien"},{"@pid":"78/2370","text":"Fabien Tarissan"}]},"title":"Time Evolution of the Importance of Nodes in dynamic Networks.","venue":"ASONAM","pages":"1200-1207","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/MagnienT15","doi":"10.1145/2808797.2809322","ee":"https://doi.org/10.1145/2808797.2809322","url":"https://dblp.org/rec/conf/asunam/MagnienT15"}, "url":"URL#3497186" }, { "@score":"1", "@id":"3497187", "info":{"authors":{"author":{"@pid":"136/5256","text":"Hamidreza Mahyar"}},"title":"Detection of Top-K Central Nodes in Social Networks: A Compressive Sensing Approach.","venue":"ASONAM","pages":"902-909","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Mahyar15","doi":"10.1145/2808797.2808811","ee":"https://doi.org/10.1145/2808797.2808811","url":"https://dblp.org/rec/conf/asunam/Mahyar15"}, "url":"URL#3497187" }, { "@score":"1", "@id":"3497188", "info":{"authors":{"author":[{"@pid":"136/5256","text":"Hamidreza Mahyar"},{"@pid":"01/4547","text":"Hamid R. Rabiee"},{"@pid":"m/AliMovagharRahimabadi","text":"Ali Movaghar 0001"},{"@pid":"171/2142","text":"Elaheh Ghalebi"},{"@pid":"125/4041","text":"Ali Nazemian"}]},"title":"CS-ComDet: A Compressive Sensing Approach for Inter-Community Detection in Social Networks.","venue":"ASONAM","pages":"89-96","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/MahyarRMGN15","doi":"10.1145/2808797.2808856","ee":"https://doi.org/10.1145/2808797.2808856","url":"https://dblp.org/rec/conf/asunam/MahyarRMGN15"}, "url":"URL#3497188" }, { "@score":"1", "@id":"3497189", "info":{"authors":{"author":[{"@pid":"22/9458","text":"Fragkiskos D. Malliaros"},{"@pid":"171/2279","text":"Konstantinos Skianis"}]},"title":"Graph-Based Term Weighting for Text Categorization.","venue":"ASONAM","pages":"1473-1479","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/MalliarosS15","doi":"10.1145/2808797.2808872","ee":"https://doi.org/10.1145/2808797.2808872","url":"https://dblp.org/rec/conf/asunam/MalliarosS15"}, "url":"URL#3497189" }, { "@score":"1", "@id":"3497190", "info":{"authors":{"author":[{"@pid":"171/2229","text":"Eva García Martín"},{"@pid":"55/1994","text":"Niklas Lavesson"},{"@pid":"88/4207","text":"Håkan Grahn"}]},"title":"Energy Efficiency in Data Stream Mining.","venue":"ASONAM","pages":"1125-1132","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/MartinLG15","doi":"10.1145/2808797.2808863","ee":"https://doi.org/10.1145/2808797.2808863","url":"https://dblp.org/rec/conf/asunam/MartinLG15"}, "url":"URL#3497190" }, { "@score":"1", "@id":"3497191", "info":{"authors":{"author":[{"@pid":"171/2190","text":"José Juan Martínez-Peláez"},{"@pid":"03/821","text":"Jorge Buenabad Chávez"},{"@pid":"09/11441","text":"José Rangel-Garcia"},{"@pid":"171/2223","text":"Rafael Ramírez-Meléndez"}]},"title":"BDSP: A Big Data Start Platform.","venue":"ASONAM","pages":"1110-1117","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Martinez-Pelaez15","doi":"10.1145/2808797.2808839","ee":"https://doi.org/10.1145/2808797.2808839","url":"https://dblp.org/rec/conf/asunam/Martinez-Pelaez15"}, "url":"URL#3497191" }, { "@score":"1", "@id":"3497192", "info":{"authors":{"author":[{"@pid":"171/2224","text":"Hasan Al Maruf"},{"@pid":"171/2170","text":"Nagib Meshkat"},{"@pid":"46/2884","text":"Mohammed Eunus Ali"},{"@pid":"m/JalalMahmud","text":"Jalal Mahmud"}]},"title":"Human behaviour in different social medias: A case study of Twitter and Disqus.","venue":"ASONAM","pages":"270-273","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/MarufMAM15","doi":"10.1145/2808797.2809395","ee":"https://doi.org/10.1145/2808797.2809395","url":"https://dblp.org/rec/conf/asunam/MarufMAM15"}, "url":"URL#3497192" }, { "@score":"1", "@id":"3497193", "info":{"authors":{"author":[{"@pid":"82/6722","text":"Osamu Maruyama"},{"@pid":"w/LimsoonWong","text":"Limsoon Wong"}]},"title":"Regularizing predicted complexes by mutually exclusive protein-protein interactions.","venue":"ASONAM","pages":"1068-1075","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/MaruyamaW15","doi":"10.1145/2808797.2808817","ee":"https://doi.org/10.1145/2808797.2808817","url":"https://dblp.org/rec/conf/asunam/MaruyamaW15"}, "url":"URL#3497193" }, { "@score":"1", "@id":"3497194", "info":{"authors":{"author":[{"@pid":"167/5998","text":"Farzan Masrour"},{"@pid":"151/6674","text":"Iman Barjasteh"},{"@pid":"47/3471","text":"Rana Forsati"},{"@pid":"e/AHEsfahanian","text":"Abdol-Hossein Esfahanian"},{"@pid":"r/HayderRadha","text":"Hayder Radha"}]},"title":"Network Completion with Node Similarity: A Matrix Completion Approach with Provable Guarantees.","venue":"ASONAM","pages":"302-307","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/MasrourBFER15","doi":"10.1145/2808797.2809407","ee":"https://doi.org/10.1145/2808797.2809407","url":"https://dblp.org/rec/conf/asunam/MasrourBFER15"}, "url":"URL#3497194" }, { "@score":"1", "@id":"3497195", "info":{"authors":{"author":[{"@pid":"171/2136","text":"Joseph Mei"},{"@pid":"71/6909","text":"Richard Frank"}]},"title":"Sentiment Crawling: Extremist Content Collection through a Sentiment Analysis Guided Web-Crawler.","venue":"ASONAM","pages":"1024-1027","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/MeiF15","doi":"10.1145/2808797.2809373","ee":"https://doi.org/10.1145/2808797.2809373","url":"https://dblp.org/rec/conf/asunam/MeiF15"}, "url":"URL#3497195" }, { "@score":"1", "@id":"3497196", "info":{"authors":{"author":[{"@pid":"128/0131","text":"Kevin Mentzer"},{"@pid":"08/7662","text":"François-Xavier Dudouet"},{"@pid":"47/3578","text":"Dominique Haughton"},{"@pid":"49/10867","text":"Pierre Latouche"},{"@pid":"23/2793","text":"Fabrice Rossi"}]},"title":"Is the corporate elite disintegrating?: Interlock boards and the Mizruchi hypothesis.","venue":"ASONAM","pages":"781-786","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/MentzerDHLR15","doi":"10.1145/2808797.2808890","ee":"https://doi.org/10.1145/2808797.2808890","url":"https://dblp.org/rec/conf/asunam/MentzerDHLR15"}, "url":"URL#3497196" }, { "@score":"1", "@id":"3497197", "info":{"authors":{"author":[{"@pid":"18/5613-1","text":"Hui Miao 0001"},{"@pid":"158/5211","text":"Peixin Gao"},{"@pid":"334/4488","text":"MohammadTaghi Hajiaghayi"},{"@pid":"b/JohnSBaras","text":"John S. Baras"}]},"title":"HyperCubeMap: Optimal Social Network Ad Allocation Using Hyperbolic Embedding.","venue":"ASONAM","pages":"357-362","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/MiaoGHB15","doi":"10.1145/2808797.2809397","ee":"https://doi.org/10.1145/2808797.2809397","url":"https://dblp.org/rec/conf/asunam/MiaoGHB15"}, "url":"URL#3497197" }, { "@score":"1", "@id":"3497198", "info":{"authors":{"author":{"@pid":"12/9833","text":"Radoslaw Michalski"}},"title":"Linear Threshold Model in Temporal Networks: Seed Selection for Social Influence.","venue":"ASONAM","pages":"922-923","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Michalski15","doi":"10.1145/2808797.2809346","ee":"https://doi.org/10.1145/2808797.2809346","url":"https://dblp.org/rec/conf/asunam/Michalski15"}, "url":"URL#3497198" }, { "@score":"1", "@id":"3497199", "info":{"authors":{"author":[{"@pid":"171/2236","text":"Shodai Mihara"},{"@pid":"10/10038","text":"Sho Tsugawa"},{"@pid":"86/6616","text":"Hiroyuki Ohsaki"}]},"title":"Influence Maximization Problem for Unknown Social Networks.","venue":"ASONAM","pages":"1539-1546","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/MiharaTO15","doi":"10.1145/2808797.2808885","ee":"https://doi.org/10.1145/2808797.2808885","url":"https://dblp.org/rec/conf/asunam/MiharaTO15"}, "url":"URL#3497199" }, { "@score":"1", "@id":"3497200", "info":{"authors":{"author":[{"@pid":"153/2860","text":"Tyler Munger"},{"@pid":"153/2883","text":"Jiabin Zhao"}]},"title":"Identifying Influential Users in On-line Support Forums using Topical Expertise and Social Network Analysis.","venue":"ASONAM","pages":"721-728","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/MungerZ15","doi":"10.1145/2808797.2810059","ee":"https://doi.org/10.1145/2808797.2810059","url":"https://dblp.org/rec/conf/asunam/MungerZ15"}, "url":"URL#3497200" }, { "@score":"1", "@id":"3497201", "info":{"authors":{"author":[{"@pid":"126/2218","text":"Saurabh Nagrecha"},{"@pid":"c/NiteshVChawla","text":"Nitesh V. Chawla"},{"@pid":"b/HorstBunke","text":"Horst Bunke"}]},"title":"Recurrent Subgraph Prediction.","venue":"ASONAM","pages":"416-423","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/NagrechaCB15","doi":"10.1145/2808797.2809283","ee":"https://doi.org/10.1145/2808797.2809283","url":"https://dblp.org/rec/conf/asunam/NagrechaCB15"}, "url":"URL#3497201" }, { "@score":"1", "@id":"3497202", "info":{"authors":{"author":[{"@pid":"171/2182","text":"Chang-Jun Nan"},{"@pid":"85/8572","text":"Kyung-Min Kim"},{"@pid":"09/5682","text":"Byoung-Tak Zhang"}]},"title":"Social Network Analysis of TV Drama Characters via Deep Concept Hierarchies.","venue":"ASONAM","pages":"831-836","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/NanKZ15","doi":"10.1145/2808797.2809306","ee":"https://doi.org/10.1145/2808797.2809306","url":"https://dblp.org/rec/conf/asunam/NanKZ15"}, "url":"URL#3497202" }, { "@score":"1", "@id":"3497203", "info":{"authors":{"author":[{"@pid":"129/7092","text":"Bruce Ndibanje"},{"@pid":"152/7291","text":"Young-Jin Kang"},{"@pid":"43/7955","text":"Mangal Sain"},{"@pid":"75/1793-1","text":"Hoon-Jae Lee 0001"}]},"title":"An Approach to Designing a Network Security-based Application for Communications Safety.","venue":"ASONAM","pages":"1002-1009","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/NdibanjeKSL15","doi":"10.1145/2808797.2808808","ee":"https://doi.org/10.1145/2808797.2808808","url":"https://dblp.org/rec/conf/asunam/NdibanjeKSL15"}, "url":"URL#3497203" }, { "@score":"1", "@id":"3497204", "info":{"authors":{"author":[{"@pid":"150/6482","text":"Hiep H. Nguyen"},{"@pid":"55/2451","text":"Abdessamad Imine"},{"@pid":"r/MichaelRusinowitch","text":"Michaël Rusinowitch"}]},"title":"Differentially Private Publication of Social Graphs at Linear Cost.","venue":"ASONAM","pages":"596-599","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/NguyenIR15","doi":"10.1145/2808797.2809385","ee":"https://doi.org/10.1145/2808797.2809385","url":"https://dblp.org/rec/conf/asunam/NguyenIR15"}, "url":"URL#3497204" }, { "@score":"1", "@id":"3497205", "info":{"authors":{"author":[{"@pid":"18/2190","text":"Hoang Nguyen"},{"@pid":"171/2164","text":"Rachel Richards"},{"@pid":"25/517","text":"Chien-Chung Chan"},{"@pid":"l/KJLiszka","text":"Kathy J. Liszka"}]},"title":"RedTweet: Recommendation Engine for Reddit.","venue":"ASONAM","pages":"1381-1388","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/NguyenRCL15","doi":"10.1145/2808797.2809284","ee":"https://doi.org/10.1145/2808797.2809284","url":"https://dblp.org/rec/conf/asunam/NguyenRCL15"}, "url":"URL#3497205" }, { "@score":"1", "@id":"3497206", "info":{"authors":{"author":[{"@pid":"74/9990-1","text":"Yue Ning 0001"},{"@pid":"142/2971","text":"Sathappan Muthiah"},{"@pid":"19/543","text":"Ravi Tandon"},{"@pid":"r/NarenRamakrishnan","text":"Naren Ramakrishnan"}]},"title":"Uncovering News-Twitter Reciprocity via Interaction Patterns.","venue":"ASONAM","pages":"1-8","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/NingMTR15","doi":"10.1145/2808797.2809329","ee":"https://doi.org/10.1145/2808797.2809329","url":"https://dblp.org/rec/conf/asunam/NingMTR15"}, "url":"URL#3497206" }, { "@score":"1", "@id":"3497207", "info":{"authors":{"author":[{"@pid":"166/1207","text":"Eric Nunes"},{"@pid":"166/1145","text":"Casey Buto"},{"@pid":"73/8292","text":"Paulo Shakarian"},{"@pid":"57/241","text":"Christian Lebiere"},{"@pid":"166/1373","text":"Stefano Bennati"},{"@pid":"54/5294-1","text":"Robert Thomson 0001"},{"@pid":"166/1225","text":"Holger Jaenisch"}]},"title":"Malware Task Identification: A Data Driven Approach.","venue":"ASONAM","pages":"978-985","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/NunesBSLBTJ15","doi":"10.1145/2808797.2808894","ee":"https://doi.org/10.1145/2808797.2808894","url":"https://dblp.org/rec/conf/asunam/NunesBSLBTJ15"}, "url":"URL#3497207" }, { "@score":"1", "@id":"3497208", "info":{"authors":{"author":[{"@pid":"166/1207","text":"Eric Nunes"},{"@pid":"166/1489","text":"Nimish Kulkarni"},{"@pid":"73/8292","text":"Paulo Shakarian"},{"@pid":"135/5976","text":"Andrew Ruef"},{"@pid":"166/1254","text":"Jay Little"}]},"title":"Cyber-Deception and Attribution in Capture-the-Flag Exercises.","venue":"ASONAM","pages":"962-965","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/NunesKSRL15","doi":"10.1145/2808797.2809362","ee":"https://doi.org/10.1145/2808797.2809362","url":"https://dblp.org/rec/conf/asunam/NunesKSRL15"}, "url":"URL#3497208" }, { "@score":"1", "@id":"3497209", "info":{"authors":{"author":[{"@pid":"171/2239","text":"Sharyn O'Halloran"},{"@pid":"21/3303","text":"Sameer Maskey"},{"@pid":"171/2116","text":"Geraldine McAllister"},{"@pid":"171/2207","text":"David K. Park"},{"@pid":"171/2251","text":"Kaiping Chen"}]},"title":"Big Data and the Regulation of Financial Markets.","venue":"ASONAM","pages":"1118-1124","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/OHalloranMMPC15","doi":"10.1145/2808797.2808841","ee":"https://doi.org/10.1145/2808797.2808841","url":"https://dblp.org/rec/conf/asunam/OHalloranMMPC15"}, "url":"URL#3497209" }, { "@score":"1", "@id":"3497210", "info":{"authors":{"author":[{"@pid":"149/9919","text":"Adam Ondrejka"},{"@pid":"40/5129","text":"Petr Saloun"},{"@pid":"143/2321","text":"Jakub Stonawski"},{"@pid":"82/2538","text":"Ivan Zelinka"}]},"title":"Finding Posts in Digital Libraries of Authors with Garbled Names.","venue":"ASONAM","pages":"1582-1583","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/OndrejkaSSZ15","doi":"10.1145/2808797.2809343","ee":"https://doi.org/10.1145/2808797.2809343","url":"https://dblp.org/rec/conf/asunam/OndrejkaSSZ15"}, "url":"URL#3497210" }, { "@score":"1", "@id":"3497211", "info":{"authors":{"author":[{"@pid":"81/7439","text":"Günce Keziban Orman"},{"@pid":"171/2143","text":"Onur Karadeli"},{"@pid":"171/2261","text":"Emre ÇaliotaSiotar"}]},"title":"Overlapping Communities via k-Connected Ego Centered Groups.","venue":"ASONAM","pages":"1598-1599","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/OrmanKC15","doi":"10.1145/2808797.2809351","ee":"https://doi.org/10.1145/2808797.2809351","url":"https://dblp.org/rec/conf/asunam/OrmanKC15"}, "url":"URL#3497211" }, { "@score":"1", "@id":"3497212", "info":{"authors":{"author":[{"@pid":"40/3371","text":"Fatih Özgül"},{"@pid":"04/5695","text":"Zeki Erdem"}]},"title":"Deciding Resilient Criminal Networks.","venue":"ASONAM","pages":"1368-1372","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/OzgulE15","doi":"10.1145/2808797.2808857","ee":"https://doi.org/10.1145/2808797.2808857","url":"https://dblp.org/rec/conf/asunam/OzgulE15"}, "url":"URL#3497212" }, { "@score":"1", "@id":"3497213", "info":{"authors":{"author":[{"@pid":"17/9282","text":"Makbule Gulcin Ozsoy"},{"@pid":"99/4002","text":"Faruk Polat"},{"@pid":"78/11148","text":"Reda Alhajj"}]},"title":"Modeling Individuals and Making Recommendations Using Multiple Social Networks.","venue":"ASONAM","pages":"1184-1191","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/OzsoyPA15","doi":"10.1145/2808797.2808898","ee":"https://doi.org/10.1145/2808797.2808898","url":"https://dblp.org/rec/conf/asunam/OzsoyPA15"}, "url":"URL#3497213" }, { "@score":"1", "@id":"3497214", "info":{"authors":{"author":[{"@pid":"44/3399","text":"Costas Panagiotakis"},{"@pid":"77/7095","text":"Harris Papadakis"},{"@pid":"46/4163","text":"Paraskevi Fragopoulou"}]},"title":"Local Community Detection via Flow Propagation.","venue":"ASONAM","pages":"81-88","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/PanagiotakisPF15","doi":"10.1145/2808797.2808892","ee":"https://doi.org/10.1145/2808797.2808892","url":"https://dblp.org/rec/conf/asunam/PanagiotakisPF15"}, "url":"URL#3497214" }, { "@score":"1", "@id":"3497215", "info":{"authors":{"author":[{"@pid":"167/4127","text":"Arun Pandey"},{"@pid":"171/2226","text":"Roshni Chakraborty"},{"@pid":"171/2233","text":"Soumya Sarkar"},{"@pid":"59/4869","text":"Joydeep Chandra"}]},"title":"Analyzing Link Dynamics in Scientific Collaboration Networks: A Social Yield Based Perspective.","venue":"ASONAM","pages":"1395-1402","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/PandeyCSC15","doi":"10.1145/2808797.2808835","ee":"https://doi.org/10.1145/2808797.2808835","url":"https://dblp.org/rec/conf/asunam/PandeyCSC15"}, "url":"URL#3497215" }, { "@score":"1", "@id":"3497216", "info":{"authors":{"author":[{"@pid":"88/11204","text":"Athanasios Papaoikonomou"},{"@pid":"75/1726","text":"Magdalini Kardara"},{"@pid":"02/5489","text":"Theodora A. Varvarigou"}]},"title":"Trust Inference in Online Social Networks.","venue":"ASONAM","pages":"600-604","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/PapaoikonomouKV15","doi":"10.1145/2808797.2809418","ee":"https://doi.org/10.1145/2808797.2809418","url":"https://dblp.org/rec/conf/asunam/PapaoikonomouKV15"}, "url":"URL#3497216" }, { "@score":"1", "@id":"3497217", "info":{"authors":{"author":[{"@pid":"150/2020","text":"Abigail Paradise"},{"@pid":"56/5380","text":"Asaf Shabtai"},{"@pid":"13/3098","text":"Rami Puzis"}]},"title":"Hunting Organization-Targeted Socialbots.","venue":"ASONAM","pages":"537-540","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ParadiseSP15","doi":"10.1145/2808797.2809396","ee":"https://doi.org/10.1145/2808797.2809396","url":"https://dblp.org/rec/conf/asunam/ParadiseSP15"}, "url":"URL#3497217" }, { "@score":"1", "@id":"3497218", "info":{"authors":{"author":[{"@pid":"33/10399","text":"Pavlos Paraskevopoulos"},{"@pid":"p/ThemisPalpanas","text":"Themis Palpanas"}]},"title":"Fine-Grained Geolocalisation of Non-Geotagged Tweets.","venue":"ASONAM","pages":"105-112","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Paraskevopoulos15","doi":"10.1145/2808797.2808869","ee":"https://doi.org/10.1145/2808797.2808869","url":"https://dblp.org/rec/conf/asunam/Paraskevopoulos15"}, "url":"URL#3497218" }, { "@score":"1", "@id":"3497219", "info":{"authors":{"author":[{"@pid":"08/1020","text":"Georgios Petkos"},{"@pid":"38/3754","text":"Symeon Papadopoulos"},{"@pid":"k/YiannisKompatsiaris","text":"Yiannis Kompatsiaris"}]},"title":"Social Circle Discovery in Ego-Networks by Mining the Latent Structure of User Connections and Profile Attributes.","venue":"ASONAM","pages":"880-887","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/PetkosPK15","doi":"10.1145/2808797.2809303","ee":"https://doi.org/10.1145/2808797.2809303","url":"https://dblp.org/rec/conf/asunam/PetkosPK15"}, "url":"URL#3497219" }, { "@score":"1", "@id":"3497220", "info":{"authors":{"author":[{"@pid":"153/5204","text":"NhatHai Phan"},{"@pid":"26/2854","text":"Dejing Dou"},{"@pid":"12/8329","text":"Brigitte Piniewski"},{"@pid":"124/7215","text":"David Kil"}]},"title":"Social Restricted Boltzmann Machine: Human Behavior Prediction in Health Social Networks.","venue":"ASONAM","pages":"424-431","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/PhanDPK15","doi":"10.1145/2808797.2809307","ee":"https://doi.org/10.1145/2808797.2809307","url":"https://dblp.org/rec/conf/asunam/PhanDPK15"}, "url":"URL#3497220" }, { "@score":"1", "@id":"3497221", "info":{"authors":{"author":[{"@pid":"06/10010","text":"Romain Picot-Clémente"},{"@pid":"07/5163","text":"Cécile Bothorel"},{"@pid":"128/0119","text":"Nicolas Jullien"}]},"title":"Social Interactions vs Revisions, What Is Important for Promotion in Wikipedia?","venue":"ASONAM","pages":"888-893","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Picot-ClementeB15","doi":"10.1145/2808797.2810063","ee":"https://doi.org/10.1145/2808797.2810063","url":"https://dblp.org/rec/conf/asunam/Picot-ClementeB15"}, "url":"URL#3497221" }, { "@score":"1", "@id":"3497222", "info":{"authors":{"author":[{"@pid":"143/5815","text":"Julio Cesar Louzada Pinto"},{"@pid":"18/65","text":"Tijani Chahed"},{"@pid":"a/EitanAltman","text":"Eitan Altman"}]},"title":"Trend detection in social networks using Hawkes processes.","venue":"ASONAM","pages":"1441-1448","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/PintoCA15","doi":"10.1145/2808797.2814178","ee":"https://doi.org/10.1145/2808797.2814178","url":"https://dblp.org/rec/conf/asunam/PintoCA15"}, "url":"URL#3497222" }, { "@score":"1", "@id":"3497223", "info":{"authors":{"author":[{"@pid":"59/5877","text":"Vassilis Plachouras"},{"@pid":"67/6415","text":"Jochen L. Leidner"}]},"title":"Information Extraction of Regulatory Enforcement Actions: From Anti-Money Laundering Compliance to Countering Terrorism Finance.","venue":"ASONAM","pages":"950-953","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/PlachourasL15","doi":"10.1145/2808797.2809368","ee":"https://doi.org/10.1145/2808797.2809368","url":"https://dblp.org/rec/conf/asunam/PlachourasL15"}, "url":"URL#3497223" }, { "@score":"1", "@id":"3497224", "info":{"authors":{"author":[{"@pid":"133/0873","text":"Adrian Popiel"},{"@pid":"k/PrzemyslawKazienko","text":"Przemyslaw Kazienko"},{"@pid":"74/608","text":"Tomasz Kajdanowicz"}]},"title":"MuNeG: The Framework for Multilayer Network Generator.","venue":"ASONAM","pages":"1316-1323","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/PopielKK15","doi":"10.1145/2808797.2808902","ee":"https://doi.org/10.1145/2808797.2808902","url":"https://dblp.org/rec/conf/asunam/PopielKK15"}, "url":"URL#3497224" }, { "@score":"1", "@id":"3497225", "info":{"authors":{"author":[{"@pid":"171/2273","text":"Dimitris Proios"},{"@pid":"67/5440","text":"Magdalini Eirinaki"},{"@pid":"v/IraklisVarlamis","text":"Iraklis Varlamis"}]},"title":"TipMe: Personalized advertising and aspect-based opinion mining for users and businesses.","venue":"ASONAM","pages":"1489-1494","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ProiosEV15","doi":"10.1145/2808797.2809324","ee":"https://doi.org/10.1145/2808797.2809324","url":"https://dblp.org/rec/conf/asunam/ProiosEV15"}, "url":"URL#3497225" }, { "@score":"1", "@id":"3497226", "info":{"authors":{"author":[{"@pid":"21/2890","text":"Amir Afrasiabi Rad"},{"@pid":"96/778","text":"Paola Flocchini"},{"@pid":"163/1993","text":"Joanne Gaudet"}]},"title":"Tempus Fugit: The Impact of Time in Knowledge Mobilization Networks.","venue":"ASONAM","pages":"1523-1530","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/RadFG15","doi":"10.1145/2808797.2809315","ee":"https://doi.org/10.1145/2808797.2809315","url":"https://dblp.org/rec/conf/asunam/RadFG15"}, "url":"URL#3497226" }, { "@score":"1", "@id":"3497227", "info":{"authors":{"author":[{"@pid":"150/6606","text":"Rahat Ibn Rafiq"},{"@pid":"117/3396","text":"Homa Hosseinmardi"},{"@pid":"74/2447","text":"Richard Han 0001"},{"@pid":"11/808","text":"Qin Lv"},{"@pid":"37/3475","text":"Shivakant Mishra"},{"@pid":"160/8808","text":"Sabrina Arredondo Mattson"}]},"title":"Careful what you share in six seconds: Detecting cyberbullying instances in Vine.","venue":"ASONAM","pages":"617-622","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/RafiqHHLMM15","doi":"10.1145/2808797.2809381","ee":"https://doi.org/10.1145/2808797.2809381","url":"https://dblp.org/rec/conf/asunam/RafiqHHLMM15"}, "url":"URL#3497227" }, { "@score":"1", "@id":"3497228", "info":{"authors":{"author":[{"@pid":"118/8743","text":"Giancarlo Ragozini"},{"@pid":"118/8823","text":"Maria Rosaria D'Esposito"}]},"title":"Archetypal Networks.","venue":"ASONAM","pages":"807-814","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/RagoziniD15","doi":"10.1145/2808797.2808837","ee":"https://doi.org/10.1145/2808797.2808837","url":"https://dblp.org/rec/conf/asunam/RagoziniD15"}, "url":"URL#3497228" }, { "@score":"1", "@id":"3497229", "info":{"authors":{"author":[{"@pid":"60/11261","text":"Syed Sadiqur Rahman"},{"@pid":"90/9641","text":"John M. Easton"},{"@pid":"10/710","text":"Clive Roberts"}]},"title":"Mining Open and Crowdsourced Data to Improve Situational Awareness for Railway.","venue":"ASONAM","pages":"1240-1243","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/RahmanER15","doi":"10.1145/2808797.2809369","ee":"https://doi.org/10.1145/2808797.2809369","url":"https://dblp.org/rec/conf/asunam/RahmanER15"}, "url":"URL#3497229" }, { "@score":"1", "@id":"3497230", "info":{"authors":{"author":[{"@pid":"174/1201","text":"Alfredo Ramos Lezama"},{"@pid":"70/7423","text":"Irene-Angelica Chounta"},{"@pid":"43/7360","text":"Tilman Göhnert"},{"@pid":"h/HeinzUlrichHoppe","text":"Heinz Ulrich Hoppe"}]},"title":"Exploring Visual Stability in Dynamic Graph Drawings: A Case Study.","venue":"ASONAM","pages":"1577-1579","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/RamosCGH15","doi":"10.1145/2808797.2809341","ee":"https://doi.org/10.1145/2808797.2809341","url":"https://dblp.org/rec/conf/asunam/RamosCGH15"}, "url":"URL#3497230" }, { "@score":"1", "@id":"3497231", "info":{"authors":{"author":[{"@pid":"171/2260","text":"Ehsan Raoufi"},{"@pid":"171/2194","text":"Hassan Akrami"},{"@pid":"171/2204","text":"Behzad Khansarinejad"},{"@pid":"171/2264","text":"Hamid Abtahi"}]},"title":"Epitope mapping and antigenic evaluation of Helicobacter pylori Urease subunit beta fragment.","venue":"ASONAM","pages":"1076-1082","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/RaoufiAKA15","doi":"10.1145/2808797.2809365","ee":"https://doi.org/10.1145/2808797.2809365","url":"https://dblp.org/rec/conf/asunam/RaoufiAKA15"}, "url":"URL#3497231" }, { "@score":"1", "@id":"3497232", "info":{"authors":{"author":[{"@pid":"171/2260","text":"Ehsan Raoufi"},{"@pid":"152/9000","text":"Maryam Hemmati"},{"@pid":"171/2281","text":"Hossein EinAbadi"},{"@pid":"171/2146","text":"Hossein Fallahi"}]},"title":"Predicting candidate epitopes on Ebolaviruse for possible vaccine development.","venue":"ASONAM","pages":"1083-1088","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/RaoufiHEF15","doi":"10.1145/2808797.2809370","ee":"https://doi.org/10.1145/2808797.2809370","url":"https://dblp.org/rec/conf/asunam/RaoufiHEF15"}, "url":"URL#3497232" }, { "@score":"1", "@id":"3497233", "info":{"authors":{"author":{"@pid":"171/2211","text":"Johanna Rapp"}},"title":"Generating Social Network Data: Lessons Learned from Field Research in Ghana's Petroleum Sector.","venue":"ASONAM","pages":"779-780","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Rapp15","doi":"10.1145/2808797.2809426","ee":"https://doi.org/10.1145/2808797.2809426","url":"https://dblp.org/rec/conf/asunam/Rapp15"}, "url":"URL#3497233" }, { "@score":"1", "@id":"3497234", "info":{"authors":{"author":[{"@pid":"153/2820","text":"Amer Rasheed"},{"@pid":"w/UffeKockWiil","text":"Uffe Kock Wiil"}]},"title":"Evaluating Criminal Networks with PEVNET.","venue":"ASONAM","pages":"1028-1031","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/RasheedW15","doi":"10.1145/2808797.2809366","ee":"https://doi.org/10.1145/2808797.2809366","url":"https://dblp.org/rec/conf/asunam/RasheedW15"}, "url":"URL#3497234" }, { "@score":"1", "@id":"3497235", "info":{"authors":{"author":[{"@pid":"171/2132","text":"Parisa Rastin"},{"@pid":"42/4259","text":"Rushed Kanawati"}]},"title":"A multiplex-network based approach for clustering ensemble selection.","venue":"ASONAM","pages":"1332-1339","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/RastinK15","doi":"10.1145/2808797.2808825","ee":"https://doi.org/10.1145/2808797.2808825","url":"https://dblp.org/rec/conf/asunam/RastinK15"}, "url":"URL#3497235" }, { "@score":"1", "@id":"3497236", "info":{"authors":{"author":[{"@pid":"48/10817","text":"Amit Rechavi"},{"@pid":"171/2284","text":"Tamar Berenblum"},{"@pid":"127/9062","text":"David Maimon"},{"@pid":"171/2178","text":"Ido Sivan Sevilla"}]},"title":"Hackers Topology Matter Geography: Mapping the Dynamics of Repeated System Trespassing Events Networks.","venue":"ASONAM","pages":"795-804","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/RechaviBMS15","doi":"10.1145/2808797.2808873","ee":"https://doi.org/10.1145/2808797.2808873","url":"https://dblp.org/rec/conf/asunam/RechaviBMS15"}, "url":"URL#3497236" }, { "@score":"1", "@id":"3497237", "info":{"authors":{"author":[{"@pid":"139/0722","text":"Alexandre Reiffers-Masson"},{"@pid":"a/EitanAltman","text":"Eitan Altman"},{"@pid":"21/5635","text":"Yezekael Hayel"}]},"title":"Posting behavior in Social Networks and Content Active Filtering.","venue":"ASONAM","pages":"1555-1562","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Reiffers-Masson15","doi":"10.1145/2808797.2808912","ee":"https://doi.org/10.1145/2808797.2808912","url":"https://dblp.org/rec/conf/asunam/Reiffers-Masson15"}, "url":"URL#3497237" }, { "@score":"1", "@id":"3497238", "info":{"authors":{"author":[{"@pid":"160/8677","text":"Aria Rezaei"},{"@pid":"160/9173","text":"Saeed Mahlouji Far"},{"@pid":"21/473","text":"Mahdieh Soleymani"}]},"title":"Near Linear-Time Community Detection in Networks with Hardly Detectable Community Structure.","venue":"ASONAM","pages":"65-72","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/RezaeiFS15","doi":"10.1145/2808797.2808903","ee":"https://doi.org/10.1145/2808797.2808903","url":"https://dblp.org/rec/conf/asunam/RezaeiFS15"}, "url":"URL#3497238" }, { "@score":"1", "@id":"3497239", "info":{"authors":{"author":[{"@pid":"171/2171","text":"Baptiste de La Robertie"},{"@pid":"44/5181","text":"Yoann Pitarch"},{"@pid":"t/OlivierTeste","text":"Olivier Teste"}]},"title":"Measuring Article Quality in Wikipedia using the Collaboration Network.","venue":"ASONAM","pages":"464-471","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/RobertiePT15","doi":"10.1145/2808797.2808895","ee":"https://doi.org/10.1145/2808797.2808895","url":"https://dblp.org/rec/conf/asunam/RobertiePT15"}, "url":"URL#3497239" }, { "@score":"1", "@id":"3497240", "info":{"authors":{"author":[{"@pid":"r/MarcoRoccetti","text":"Marco Roccetti"},{"@pid":"171/2228","text":"Alice Casari"},{"@pid":"55/966","text":"Gustavo Marfia"}]},"title":"Inside Chronic Autoimmune Disease Communities: A Social Networks Perspective to Crohn's Patient Behavior and Medical Information.","venue":"ASONAM","pages":"1089-1096","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/RoccettiCM15","doi":"10.1145/2808797.2808813","ee":"https://doi.org/10.1145/2808797.2808813","url":"https://dblp.org/rec/conf/asunam/RoccettiCM15"}, "url":"URL#3497240" }, { "@score":"1", "@id":"3497241", "info":{"authors":{"author":[{"@pid":"92/10089","text":"Mahnaz Roshanaei"},{"@pid":"74/2447","text":"Richard Han 0001"},{"@pid":"37/3475","text":"Shivakant Mishra"}]},"title":"Features for mood prediction in social media.","venue":"ASONAM","pages":"1580-1581","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/RoshanaeiHM15","doi":"10.1145/2808797.2809342","ee":"https://doi.org/10.1145/2808797.2809342","url":"https://dblp.org/rec/conf/asunam/RoshanaeiHM15"}, "url":"URL#3497241" }, { "@score":"1", "@id":"3497242", "info":{"authors":{"author":[{"@pid":"27/10814","text":"Giulio Rossetti"},{"@pid":"157/9871","text":"Riccardo Guidotti"},{"@pid":"130/4071","text":"Diego Pennacchioli"},{"@pid":"p/DPedreschi","text":"Dino Pedreschi"},{"@pid":"g/FoscaGiannotti","text":"Fosca Giannotti"}]},"title":"Interaction Prediction in Dynamic Networks exploiting Community Discovery.","venue":"ASONAM","pages":"553-558","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/RossettiGPPG15","doi":"10.1145/2808797.2809401","ee":"https://doi.org/10.1145/2808797.2809401","url":"https://dblp.org/rec/conf/asunam/RossettiGPPG15"}, "url":"URL#3497242" }, { "@score":"1", "@id":"3497243", "info":{"authors":{"author":[{"@pid":"27/10814","text":"Giulio Rossetti"},{"@pid":"125/4098","text":"Luca Pappalardo"},{"@pid":"116/2975","text":"Riivo Kikas"},{"@pid":"p/DPedreschi","text":"Dino Pedreschi"},{"@pid":"g/FoscaGiannotti","text":"Fosca Giannotti"},{"@pid":"d/MarlonDumas","text":"Marlon Dumas"}]},"title":"Community-centric analysis of user engagement in Skype social network.","venue":"ASONAM","pages":"547-552","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/RossettiPKPGD15","doi":"10.1145/2808797.2809384","ee":"https://doi.org/10.1145/2808797.2809384","url":"https://dblp.org/rec/conf/asunam/RossettiPKPGD15"}, "url":"URL#3497243" }, { "@score":"1", "@id":"3497244", "info":{"authors":{"author":[{"@pid":"159/6742","text":"Valeria Sadovykh"},{"@pid":"97/4879","text":"David Sundaram"}]},"title":"How Do Online Social Networks Support Decision Making?: A Pluralistic Research Agenda.","venue":"ASONAM","pages":"787-794","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SadovykhS15","doi":"10.1145/2808797.2808875","ee":"https://doi.org/10.1145/2808797.2808875","url":"https://dblp.org/rec/conf/asunam/SadovykhS15"}, "url":"URL#3497244" }, { "@score":"1", "@id":"3497245", "info":{"authors":{"author":[{"@pid":"159/6742","text":"Valeria Sadovykh"},{"@pid":"97/4879","text":"David Sundaram"}]},"title":"Decision Making and Support in Healthcare Online Social Networks.","venue":"ASONAM","pages":"1048-1052","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SadovykhS15a","doi":"10.1145/2808797.2809363","ee":"https://doi.org/10.1145/2808797.2809363","url":"https://dblp.org/rec/conf/asunam/SadovykhS15a"}, "url":"URL#3497245" }, { "@score":"1", "@id":"3497246", "info":{"authors":{"author":{"@pid":"26/9994","text":"Stanislaw Saganowski"}},"title":"Predicting Community Evolution in Social Networks.","venue":"ASONAM","pages":"924-925","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Saganowski15","doi":"10.1145/2808797.2809353","ee":"https://doi.org/10.1145/2808797.2809353","url":"https://dblp.org/rec/conf/asunam/Saganowski15"}, "url":"URL#3497246" }, { "@score":"1", "@id":"3497247", "info":{"authors":{"author":[{"@pid":"23/8285","text":"Amit Saha"},{"@pid":"72/1395","text":"Nitin Agarwal"}]},"title":"Demonstrating Social Support from Autism Bloggers Community on Twitter.","venue":"ASONAM","pages":"1053-1056","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SahaA15","doi":"10.1145/2808797.2809364","ee":"https://doi.org/10.1145/2808797.2809364","url":"https://dblp.org/rec/conf/asunam/SahaA15"}, "url":"URL#3497247" }, { "@score":"1", "@id":"3497248", "info":{"authors":{"author":[{"@pid":"35/10058","text":"Bijan Ranjbar Sahraei"},{"@pid":"50/10495","text":"Haitham Bou-Ammar"},{"@pid":"t/KTuyls","text":"Karl Tuyls"},{"@pid":"07/2055","text":"Gerhard Weiss 0001"}]},"title":"On the Skewed Degree Distribution of Hierarchical Networks.","venue":"ASONAM","pages":"298-301","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SahraeiBTW15","doi":"10.1145/2808797.2809409","ee":"https://doi.org/10.1145/2808797.2809409","url":"https://dblp.org/rec/conf/asunam/SahraeiBTW15"}, "url":"URL#3497248" }, { "@score":"1", "@id":"3497249", "info":{"authors":{"author":[{"@pid":"164/6656","text":"Elvis Saravia"},{"@pid":"25/7179","text":"Carlos Rene Argueta"},{"@pid":"27/3795","text":"Yi-Shin Chen"}]},"title":"EmoViz: Mining the World's Interest through Emotion Analysis.","venue":"ASONAM","pages":"753-756","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SaraviaAC15","doi":"10.1145/2808797.2808916","ee":"https://doi.org/10.1145/2808797.2808916","url":"https://dblp.org/rec/conf/asunam/SaraviaAC15"}, "url":"URL#3497249" }, { "@score":"1", "@id":"3497250", "info":{"authors":{"author":[{"@pid":"163/1823","text":"Akrati Saxena"},{"@pid":"90/10042","text":"S. R. S. Iyengar"},{"@pid":"163/2344","text":"Yayati Gupta"}]},"title":"Understanding Spreading Patterns on Social Networks Based on Network Topology.","venue":"ASONAM","pages":"1616-1617","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SaxenaIG15","doi":"10.1145/2808797.2809360","ee":"https://doi.org/10.1145/2808797.2809360","url":"https://dblp.org/rec/conf/asunam/SaxenaIG15"}, "url":"URL#3497250" }, { "@score":"1", "@id":"3497251", "info":{"authors":{"author":[{"@pid":"163/0794","text":"Wolfgang Eugen Schlauch"},{"@pid":"l/KatharinaAnnaLehmann","text":"Katharina Anna Zweig"}]},"title":"Influence of the Null-Model on Motif Detection.","venue":"ASONAM","pages":"514-519","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SchlauchZTA15","doi":"10.1145/2808797.2809400","ee":"https://doi.org/10.1145/2808797.2809400","url":"https://dblp.org/rec/conf/asunam/SchlauchZTA15"}, "url":"URL#3497251" }, { "@score":"1", "@id":"3497252", "info":{"authors":{"author":[{"@pid":"147/4920","text":"Alon Sela"},{"@pid":"b/IradEBenGal","text":"Irad Ben-Gal"},{"@pid":"p/AlexPentland","text":"Alex Pentland"},{"@pid":"39/3255","text":"Erez Shmueli"}]},"title":"Improving Information Spread through a Scheduled Seeding Approach.","venue":"ASONAM","pages":"629-632","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SelaBPS15","doi":"10.1145/2808797.2809399","ee":"https://doi.org/10.1145/2808797.2809399","url":"https://dblp.org/rec/conf/asunam/SelaBPS15"}, "url":"URL#3497252" }, { "@score":"1", "@id":"3497253", "info":{"authors":{"author":[{"@pid":"162/9023","text":"Mohsen Shahriari"},{"@pid":"k/RalfKlamma","text":"Ralf Klamma"}]},"title":"Signed Social Networks: Link Prediction and Overlapping Community Detection.","venue":"ASONAM","pages":"1608-1609","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ShahriariK15","doi":"10.1145/2808797.2809357","ee":"https://doi.org/10.1145/2808797.2809357","url":"https://dblp.org/rec/conf/asunam/ShahriariK15"}, "url":"URL#3497253" }, { "@score":"1", "@id":"3497254", "info":{"authors":{"author":[{"@pid":"69/5513-4","text":"Ankit Sharma 0004"},{"@pid":"79/5194","text":"Rui Kuang"},{"@pid":"s/JaideepSrivastava","text":"Jaideep Srivastava"},{"@pid":"06/7742-1","text":"Xiaodong Feng 0001"},{"@pid":"166/1249-1","text":"Kartik Singhal 0001"}]},"title":"Predicting Small Group Accretion in Social Networks: A topology based incremental approach.","venue":"ASONAM","pages":"408-415","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SharmaKSFS15","doi":"10.1145/2808797.2808914","ee":"https://doi.org/10.1145/2808797.2808914","url":"https://dblp.org/rec/conf/asunam/SharmaKSFS15"}, "url":"URL#3497254" }, { "@score":"1", "@id":"3497255", "info":{"authors":{"author":[{"@pid":"16/7691-2","text":"Rajesh Sharma 0002"},{"@pid":"34/5969","text":"Matteo Magnani"},{"@pid":"69/5578","text":"Danilo Montesi"}]},"title":"Investigating the types and effects of missing data in multilayer networks.","venue":"ASONAM","pages":"392-399","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SharmaMM15","doi":"10.1145/2808797.2808889","ee":"https://doi.org/10.1145/2808797.2808889","url":"https://dblp.org/rec/conf/asunam/SharmaMM15"}, "url":"URL#3497255" }, { "@score":"1", "@id":"3497256", "info":{"authors":{"author":[{"@pid":"16/7691-2","text":"Rajesh Sharma 0002"},{"@pid":"34/5969","text":"Matteo Magnani"},{"@pid":"69/5578","text":"Danilo Montesi"}]},"title":"Understanding community patterns in large attributed social networks.","venue":"ASONAM","pages":"1503-1508","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SharmaMM15a","doi":"10.1145/2808797.2809330","ee":"https://doi.org/10.1145/2808797.2809330","url":"https://dblp.org/rec/conf/asunam/SharmaMM15a"}, "url":"URL#3497256" }, { "@score":"1", "@id":"3497257", "info":{"authors":{"author":[{"@pid":"82/3923","text":"Xiaohua Shi"},{"@pid":"56/2480","text":"Hongtao Lu"},{"@pid":"126/1076","text":"Yangcheng He"},{"@pid":"14/1570","text":"Shan He"}]},"title":"Community Detection in Social Network with Pairwisely Constrained Symmetric Non-Negative Matrix Factorization.","venue":"ASONAM","pages":"541-546","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ShiLHH15","doi":"10.1145/2808797.2809383","ee":"https://doi.org/10.1145/2808797.2809383","url":"https://dblp.org/rec/conf/asunam/ShiLHH15"}, "url":"URL#3497257" }, { "@score":"1", "@id":"3497258", "info":{"authors":{"author":[{"@pid":"154/7752","text":"Juliana Saragiotto Silva"},{"@pid":"82/9539","text":"Antonio Mauro Saraiva"}]},"title":"A Methodology for Applying Social Network Analysis Metrics to Biological Interaction Networks.","venue":"ASONAM","pages":"1300-1307","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SilvaS15","doi":"10.1145/2808797.2808824","ee":"https://doi.org/10.1145/2808797.2808824","url":"https://dblp.org/rec/conf/asunam/SilvaS15"}, "url":"URL#3497258" }, { "@score":"1", "@id":"3497259", "info":{"authors":{"author":[{"@pid":"80/3925","text":"Lisa Singh"},{"@pid":"04/999-1","text":"Grace Hui Yang"},{"@pid":"57/3752","text":"Micah Sherr"},{"@pid":"162/9064","text":"Andrew Hian-Cheong"},{"@pid":"37/2934","text":"Kevin Tian"},{"@pid":"162/9011","text":"Janet Zhu"},{"@pid":"96/3309","text":"Sicong Zhang"}]},"title":"Public Information Exposure Detection: Helping Users Understand Their Web Footprints.","venue":"ASONAM","pages":"153-161","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SinghYSHTZZ15","doi":"10.1145/2808797.2809280","ee":"https://doi.org/10.1145/2808797.2809280","url":"https://dblp.org/rec/conf/asunam/SinghYSHTZZ15"}, "url":"URL#3497259" }, { "@score":"1", "@id":"3497260", "info":{"authors":{"author":[{"@pid":"171/2188","text":"Zvi Sofershtein"},{"@pid":"c/SaraCohen","text":"Sara Cohen"}]},"title":"Predicting Email Recipients.","venue":"ASONAM","pages":"761-764","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SofershteinC15","doi":"10.1145/2808797.2808805","ee":"https://doi.org/10.1145/2808797.2808805","url":"https://dblp.org/rec/conf/asunam/SofershteinC15"}, "url":"URL#3497260" }, { "@score":"1", "@id":"3497261", "info":{"authors":{"author":[{"@pid":"23/5819","text":"Henry Soldano"},{"@pid":"99/9286","text":"Guillaume Santini"},{"@pid":"04/3811","text":"Dominique Bouthinon"}]},"title":"Local rules associated to k-communities in an attributed graph.","venue":"ASONAM","pages":"1340-1347","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SoldanoSB15","doi":"10.1145/2808797.2808893","ee":"https://doi.org/10.1145/2808797.2808893","url":"https://dblp.org/rec/conf/asunam/SoldanoSB15"}, "url":"URL#3497261" }, { "@score":"1", "@id":"3497262", "info":{"authors":{"author":[{"@pid":"171/2240","text":"Amira Soliman 0001"},{"@pid":"150/6424","text":"Leila Bahri"},{"@pid":"83/2099","text":"Barbara Carminati"},{"@pid":"f/ElenaFerrari","text":"Elena Ferrari"},{"@pid":"42/3994","text":"Sarunas Girdzijauskas"}]},"title":"DIVa: Decentralized Identity Validation for Social Networks.","venue":"ASONAM","pages":"383-391","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SolimanBCFG15","doi":"10.1145/2808797.2808861","ee":"https://doi.org/10.1145/2808797.2808861","url":"https://dblp.org/rec/conf/asunam/SolimanBCFG15"}, "url":"URL#3497262" }, { "@score":"1", "@id":"3497263", "info":{"authors":{"author":[{"@pid":"80/4302","text":"Dionisios N. Sotiropoulos"},{"@pid":"171/2270","text":"Christos Bilanakos"},{"@pid":"79/6899","text":"George M. Giaglis"}]},"title":"A Time-Variant and Non-Linear Model of Opinion Formation in Social Networks.","venue":"ASONAM","pages":"872-879","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SotiropoulosBG15","doi":"10.1145/2808797.2808829","ee":"https://doi.org/10.1145/2808797.2808829","url":"https://dblp.org/rec/conf/asunam/SotiropoulosBG15"}, "url":"URL#3497263" }, { "@score":"1", "@id":"3497264", "info":{"authors":{"author":[{"@pid":"135/5777","text":"Andreas Spitz"},{"@pid":"g/MichaelGertz","text":"Michael Gertz 0001"}]},"title":"Breaking the News: Extracting the Sparse Citation Network Backbone of Online News Articles.","venue":"ASONAM","pages":"274-279","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SpitzG15","doi":"10.1145/2808797.2809380","ee":"https://doi.org/10.1145/2808797.2809380","url":"https://dblp.org/rec/conf/asunam/SpitzG15"}, "url":"URL#3497264" }, { "@score":"1", "@id":"3497265", "info":{"authors":{"author":[{"@pid":"s/AnnaCinziaSquicciarini","text":"Anna Cinzia Squicciarini"},{"@pid":"42/8717","text":"Sarah Michele Rajtmajer"},{"@pid":"89/6455","text":"Y. Liu"},{"@pid":"36/3318","text":"Christopher Griffin 0001"}]},"title":"Identification and characterization of cyberbullying dynamics in an online social network.","venue":"ASONAM","pages":"280-285","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SquicciariniRLG15","doi":"10.1145/2808797.2809398","ee":"https://doi.org/10.1145/2808797.2809398","url":"https://dblp.org/rec/conf/asunam/SquicciariniRLG15"}, "url":"URL#3497265" }, { "@score":"1", "@id":"3497266", "info":{"authors":{"author":[{"@pid":"06/9076","text":"Ivan Srba"},{"@pid":"171/2174","text":"Marek Grznar"},{"@pid":"b/MariaBielikova","text":"Mária Bieliková"}]},"title":"Utilizing Non-QA Data to Improve Questions Routing for Users with Low QA Activity in CQA.","venue":"ASONAM","pages":"129-136","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SrbaGB15","doi":"10.1145/2808797.2809331","ee":"https://doi.org/10.1145/2808797.2809331","url":"https://dblp.org/rec/conf/asunam/SrbaGB15"}, "url":"URL#3497266" }, { "@score":"1", "@id":"3497267", "info":{"authors":{"author":[{"@pid":"77/9528","text":"Ajitesh Srivastava"},{"@pid":"72/7698","text":"Charalampos Chelmis"},{"@pid":"p/ViktorKPrasanna","text":"Viktor K. Prasanna"}]},"title":"Social Influence Computation and Maximization in Signed Networks with Competing Cascades.","venue":"ASONAM","pages":"41-48","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/SrivastavaCP15","doi":"10.1145/2808797.2809304","ee":"https://doi.org/10.1145/2808797.2809304","url":"https://dblp.org/rec/conf/asunam/SrivastavaCP15"}, "url":"URL#3497267" }, { "@score":"1", "@id":"3497268", "info":{"authors":{"author":{"@pid":"95/8016","text":"Frans N. Stokman"}},"title":"Policy Oriented Exchange Networks: Was a Copenhagen Climate Treaty Possible?: Scientific Analysis Providing New Insights for Agreement and a Better Treaty for the Planet.","venue":"ASONAM","pages":"770-778","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Stokman15","doi":"10.1145/2808797.2808911","ee":"https://doi.org/10.1145/2808797.2808911","url":"https://dblp.org/rec/conf/asunam/Stokman15"}, "url":"URL#3497268" }, { "@score":"1", "@id":"3497269", "info":{"authors":{"author":[{"@pid":"51/4159","text":"Kamal Taha"},{"@pid":"51/6407","text":"Paul D. Yoo"}]},"title":"A System for Analyzing Criminal Social Networks.","venue":"ASONAM","pages":"1017-1023","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/TahaY15","doi":"10.1145/2808797.2808827","ee":"https://doi.org/10.1145/2808797.2808827","url":"https://dblp.org/rec/conf/asunam/TahaY15"}, "url":"URL#3497269" }, { "@score":"1", "@id":"3497270", "info":{"authors":{"author":[{"@pid":"153/2815","text":"Sude Tavassoli"},{"@pid":"l/KatharinaAnnaLehmann","text":"Katharina Anna Zweig"}]},"title":"Analyzing the activity of a person in a chat by combining network analysis and fuzzy logic.","venue":"ASONAM","pages":"1565-1568","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/TavassoliZ15","doi":"10.1145/2808797.2809335","ee":"https://doi.org/10.1145/2808797.2809335","url":"https://dblp.org/rec/conf/asunam/TavassoliZ15"}, "url":"URL#3497270" }, { "@score":"1", "@id":"3497271", "info":{"authors":{"author":[{"@pid":"164/5865","text":"Irene Teinemaa"},{"@pid":"125/4044","text":"Anna Leontjeva"},{"@pid":"d/MarlonDumas","text":"Marlon Dumas"},{"@pid":"116/2975","text":"Riivo Kikas"}]},"title":"Community-Based Prediction of Activity Change in Skype.","venue":"ASONAM","pages":"73-80","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/TeinemaaLDK15","doi":"10.1145/2808797.2808853","ee":"https://doi.org/10.1145/2808797.2808853","url":"https://dblp.org/rec/conf/asunam/TeinemaaLDK15"}, "url":"URL#3497271" }, { "@score":"1", "@id":"3497272", "info":{"authors":{"author":[{"@pid":"150/2476","text":"Mohammad Hossein Tekieh"},{"@pid":"27/2793","text":"Bijan Raahemi"}]},"title":"Importance of Data Mining in Healthcare: A Survey.","venue":"ASONAM","pages":"1057-1062","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/TekiehR15","doi":"10.1145/2808797.2809367","ee":"https://doi.org/10.1145/2808797.2809367","url":"https://dblp.org/rec/conf/asunam/TekiehR15"}, "url":"URL#3497272" }, { "@score":"1", "@id":"3497273", "info":{"authors":{"author":[{"@pid":"163/2000","text":"Ya-Wen Teng"},{"@pid":"81/2962","text":"Chih-Hua Tai"},{"@pid":"y/PhilipSYu","text":"Philip S. Yu"},{"@pid":"c/MingSyanChen","text":"Ming-Syan Chen"}]},"title":"Modeling and Utilizing Dynamic Influence Strength for Personalized Promotion.","venue":"ASONAM","pages":"57-64","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/TengTYC15","doi":"10.1145/2808797.2808897","ee":"https://doi.org/10.1145/2808797.2808897","url":"https://dblp.org/rec/conf/asunam/TengTYC15"}, "url":"URL#3497273" }, { "@score":"1", "@id":"3497274", "info":{"authors":{"author":[{"@pid":"154/5507","text":"Shan-Yun Teng"},{"@pid":"43/2669","text":"Mi-Yen Yeh"},{"@pid":"43/6010","text":"Kun-Ta Chuang"}]},"title":"Toward Understanding the Mobile Social Properties: An Analysis on Instagram Photo-Sharing Network.","venue":"ASONAM","pages":"266-269","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/TengYC15","doi":"10.1145/2808797.2809416","ee":"https://doi.org/10.1145/2808797.2809416","url":"https://dblp.org/rec/conf/asunam/TengYC15"}, "url":"URL#3497274" }, { "@score":"1", "@id":"3497275", "info":{"authors":{"author":[{"@pid":"171/2156","text":"M. Thejaswi"},{"@pid":"171/2289","text":"Sriniketh Vijayaraghavan"},{"@pid":"171/2110","text":"Avinash Das"},{"@pid":"28/6653","text":"P. Santhi Thilagam"}]},"title":"Dynamics of Multi-Campaign Propagation in Online Social Networks.","venue":"ASONAM","pages":"1571-1572","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ThejaswiVDT15","doi":"10.1145/2808797.2809338","ee":"https://doi.org/10.1145/2808797.2809338","url":"https://dblp.org/rec/conf/asunam/ThejaswiVDT15"}, "url":"URL#3497275" }, { "@score":"1", "@id":"3497276", "info":{"authors":{"author":[{"@pid":"79/9765","text":"Davide Vega"},{"@pid":"26/398","text":"Roc Meseguer"},{"@pid":"35/3049","text":"Felix Freitag"},{"@pid":"34/5969","text":"Matteo Magnani"}]},"title":"Role and position detection in networks: reloaded.","venue":"ASONAM","pages":"320-325","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/VegaMFM15","doi":"10.1145/2808797.2809412","ee":"https://doi.org/10.1145/2808797.2809412","url":"https://dblp.org/rec/conf/asunam/VegaMFM15"}, "url":"URL#3497276" }, { "@score":"1", "@id":"3497277", "info":{"authors":{"author":[{"@pid":"171/2145","text":"Ilya Verenich"},{"@pid":"116/2975","text":"Riivo Kikas"},{"@pid":"d/MarlonDumas","text":"Marlon Dumas"},{"@pid":"171/2165","text":"Dmitri Melnikov"}]},"title":"Combining Propensity and Influence Models for Product Adoption Prediction.","venue":"ASONAM","pages":"49-56","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/VerenichKDM15","doi":"10.1145/2808797.2808851","ee":"https://doi.org/10.1145/2808797.2808851","url":"https://dblp.org/rec/conf/asunam/VerenichKDM15"}, "url":"URL#3497277" }, { "@score":"1", "@id":"3497278", "info":{"authors":{"author":[{"@pid":"218/9427","text":"Jordan Viard"},{"@pid":"l/MLatapy","text":"Matthieu Latapy"},{"@pid":"40/4437","text":"Clémence Magnien"}]},"title":"Revealing contact patterns among high-school students using maximal cliques in link streams.","venue":"ASONAM","pages":"1517-1522","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ViardLM15","doi":"10.1145/2808797.2809291","ee":"https://doi.org/10.1145/2808797.2809291","url":"https://dblp.org/rec/conf/asunam/ViardLM15"}, "url":"URL#3497278" }, { "@score":"1", "@id":"3497279", "info":{"authors":{"author":[{"@pid":"139/2240","text":"Véronique Van Vlasselaer"},{"@pid":"e/TinaEliassiRad","text":"Tina Eliassi-Rad"},{"@pid":"02/6979","text":"Leman Akoglu"},{"@pid":"70/2587","text":"Monique Snoeck"},{"@pid":"43/4264","text":"Bart Baesens"}]},"title":"AFRAID: Fraud Detection via Active Inference in Time-evolving Social Networks.","venue":"ASONAM","pages":"659-666","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/VlasselaerEASB15","doi":"10.1145/2808797.2810058","ee":"https://doi.org/10.1145/2808797.2810058","url":"https://dblp.org/rec/conf/asunam/VlasselaerEASB15"}, "url":"URL#3497279" }, { "@score":"1", "@id":"3497280", "info":{"authors":{"author":[{"@pid":"22/5260","text":"Thuy Vu"},{"@pid":"p/DSParkerJr","text":"Douglas Stott Parker"}]},"title":"Node Embeddings in Social Network Analysis.","venue":"ASONAM","pages":"326-329","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/VuP15","doi":"10.1145/2808797.2809408","ee":"https://doi.org/10.1145/2808797.2809408","url":"https://dblp.org/rec/conf/asunam/VuP15"}, "url":"URL#3497280" }, { "@score":"1", "@id":"3497281", "info":{"authors":{"author":[{"@pid":"05/1958","text":"Kun Wang"},{"@pid":"61/7133","text":"Duoyong Sun"}]},"title":"Research on the Shanghai Cooperation Organization Network Architecture from the Big Data Perspective.","venue":"ASONAM","pages":"1208-1211","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/WangS15","doi":"10.1145/2808797.2809372","ee":"https://doi.org/10.1145/2808797.2809372","url":"https://dblp.org/rec/conf/asunam/WangS15"}, "url":"URL#3497281" }, { "@score":"1", "@id":"3497282", "info":{"authors":{"author":[{"@pid":"21/5941-4","text":"Wenjun Wang 0004"},{"@pid":"81/3909","text":"W. Nick Street"},{"@pid":"171/2253","text":"Renato E. deMatta"}]},"title":"Topological Resilience Analysis of Supply Networks under Random Disruptions and Targeted Attacks.","venue":"ASONAM","pages":"250-257","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/WangSd15","doi":"10.1145/2808797.2809325","ee":"https://doi.org/10.1145/2808797.2809325","url":"https://dblp.org/rec/conf/asunam/WangSd15"}, "url":"URL#3497282" }, { "@score":"1", "@id":"3497283", "info":{"authors":{"author":[{"@pid":"24/4105-19","text":"Wei Wei 0019"},{"@pid":"126/6273","text":"Kenneth Joseph"},{"@pid":"92/309-1","text":"Huan Liu 0001"},{"@pid":"72/6492","text":"Kathleen M. Carley"}]},"title":"The Fragility of Twitter Social Networks Against Suspended Users.","venue":"ASONAM","pages":"9-16","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/WeiJLC15","doi":"10.1145/2808797.2809316","ee":"https://doi.org/10.1145/2808797.2809316","url":"https://dblp.org/rec/conf/asunam/WeiJLC15"}, "url":"URL#3497283" }, { "@score":"1", "@id":"3497284", "info":{"authors":{"author":{"@pid":"55/8091","text":"Stefan Wiesberg"}},"title":"Classification of Trading Networks with Combinatorial Optimization.","venue":"ASONAM","pages":"918-919","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Wiesberg15","doi":"10.1145/2808797.2809337","ee":"https://doi.org/10.1145/2808797.2809337","url":"https://dblp.org/rec/conf/asunam/Wiesberg15"}, "url":"URL#3497284" }, { "@score":"1", "@id":"3497285", "info":{"authors":{"author":{"@pid":"93/605","text":"Chyi-In Wu"}},"title":"The Impact of Co-evolution of Dynamic Networks upon Adolescent Deviant Behaviors.","venue":"ASONAM","pages":"1411-1427","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Wu15","doi":"10.1145/2808797.2809319","ee":"https://doi.org/10.1145/2808797.2809319","url":"https://dblp.org/rec/conf/asunam/Wu15"}, "url":"URL#3497285" }, { "@score":"1", "@id":"3497286", "info":{"authors":{"author":[{"@pid":"44/6914","text":"Peng Xia"},{"@pid":"01/6541","text":"Benyuan Liu"},{"@pid":"37/3868","text":"Yizhou Sun"},{"@pid":"c/CindyXChen","text":"Cindy X. Chen"}]},"title":"Reciprocal Recommendation System for Online Dating.","venue":"ASONAM","pages":"234-241","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/XiaLSC15","doi":"10.1145/2808797.2809282","ee":"https://doi.org/10.1145/2808797.2809282","url":"https://dblp.org/rec/conf/asunam/XiaLSC15"}, "url":"URL#3497286" }, { "@score":"1", "@id":"3497287", "info":{"authors":{"author":[{"@pid":"147/3334","text":"Konstantinos F. Xylogiannopoulos"},{"@pid":"54/1245","text":"Panagiotis Karampelas"},{"@pid":"78/11148","text":"Reda Alhajj"}]},"title":"Sequential All Frequent Itemsets Detection: A Method to Detect All Frequent Sequential Itemsets Using LERP-Reduced Suffix Array Data Structure and ARPaD Algorithm.","venue":"ASONAM","pages":"1141-1148","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Xylogiannopoulos15","doi":"10.1145/2808797.2809301","ee":"https://doi.org/10.1145/2808797.2809301","url":"https://dblp.org/rec/conf/asunam/Xylogiannopoulos15"}, "url":"URL#3497287" }, { "@score":"1", "@id":"3497288", "info":{"authors":{"author":[{"@pid":"70/2539-4","text":"Zhen Yang 0004"},{"@pid":"23/6660","text":"Isaac Jones"},{"@pid":"24/7536","text":"Xia Hu"},{"@pid":"92/309-1","text":"Huan Liu 0001"}]},"title":"Finding the Right Social Media Site for Questions.","venue":"ASONAM","pages":"639-644","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/YangJHL15","doi":"10.1145/2808797.2809391","ee":"https://doi.org/10.1145/2808797.2809391","url":"https://dblp.org/rec/conf/asunam/YangJHL15"}, "url":"URL#3497288" }, { "@score":"1", "@id":"3497289", "info":{"authors":{"author":[{"@pid":"01/2462","text":"Deqing Yang"},{"@pid":"96/999","text":"Yanghua Xiao"},{"@pid":"58/1757","text":"Hanghang Tong"},{"@pid":"116/5305","text":"Wanyun Cui"},{"@pid":"w/WeiWang9","text":"Wei Wang 0009"}]},"title":"Towards Topic Following in Heterogeneous Information Networks.","venue":"ASONAM","pages":"363-366","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/YangXTCW15","doi":"10.1145/2808797.2809417","ee":"https://doi.org/10.1145/2808797.2809417","url":"https://dblp.org/rec/conf/asunam/YangXTCW15"}, "url":"URL#3497289" }, { "@score":"1", "@id":"3497290", "info":{"authors":{"author":[{"@pid":"169/3304","text":"Rose Yesha"},{"@pid":"g/AryyaGangopadhyay","text":"Aryya Gangopadhyay"},{"@pid":"22/5169","text":"Eliot L. Siegel"}]},"title":"A Graph-Based Method for Analyzing Electronic Medical Records.","venue":"ASONAM","pages":"1036-1041","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/YeshaGS15","doi":"10.1145/2808797.2808806","ee":"https://doi.org/10.1145/2808797.2808806","url":"https://dblp.org/rec/conf/asunam/YeshaGS15"}, "url":"URL#3497290" }, { "@score":"1", "@id":"3497291", "info":{"authors":{"author":[{"@pid":"134/4011","text":"Anita Zakrzewska"},{"@pid":"41/3005","text":"David A. Bader"}]},"title":"A Dynamic Algorithm for Local Community Detection in Graphs.","venue":"ASONAM","pages":"559-564","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ZakrzewskaB15","doi":"10.1145/2808797.2809375","ee":"https://doi.org/10.1145/2808797.2809375","url":"https://dblp.org/rec/conf/asunam/ZakrzewskaB15"}, "url":"URL#3497291" }, { "@score":"1", "@id":"3497292", "info":{"authors":{"author":[{"@pid":"124/7260","text":"Sarka Zehnalova"},{"@pid":"97/1405","text":"Zdenek Horak"},{"@pid":"81/889","text":"Milos Kudelka"}]},"title":"Email Conversation Network Analysis: Work Groups and Teams in Organizations.","venue":"ASONAM","pages":"1262-1268","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ZehnalovaHK15","doi":"10.1145/2808797.2808862","ee":"https://doi.org/10.1145/2808797.2808862","url":"https://dblp.org/rec/conf/asunam/ZehnalovaHK15"}, "url":"URL#3497292" }, { "@score":"1", "@id":"3497293", "info":{"authors":{"author":{"@pid":"165/9162","text":"Quan Zheng 0001"}},"title":"Social networks with multiple relationship semantics.","venue":"ASONAM","pages":"894-901","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Zheng15","doi":"10.1145/2808797.2808818","ee":"https://doi.org/10.1145/2808797.2808818","url":"https://dblp.org/rec/conf/asunam/Zheng15"}, "url":"URL#3497293" }, { "@score":"1", "@id":"3497294", "info":{"authors":{"author":[{"@pid":"15/10220","text":"Chenyi Zhuang"},{"@pid":"m/QiangMa1","text":"Qiang Ma 0001"},{"@pid":"67/4179","text":"Xuefeng Liang"},{"@pid":"y/MasatoshiYoshikawa","text":"Masatoshi Yoshikawa"}]},"title":"Discovering Obscure Sightseeing Spots by Analysis of Geo-tagged Social Images.","venue":"ASONAM","pages":"590-595","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/Zhuang0LY15","doi":"10.1145/2808797.2809386","ee":"https://doi.org/10.1145/2808797.2809386","url":"https://dblp.org/rec/conf/asunam/Zhuang0LY15"}, "url":"URL#3497294" }, { "@score":"1", "@id":"3497295", "info":{"authors":{"author":[{"@pid":"54/8577","text":"Maria Francesca Zini"},{"@pid":"p/NadiaPisanti","text":"Nadia Pisanti"},{"@pid":"172/9209","text":"E. Biasci"},{"@pid":"171/2109","text":"A. Podda"},{"@pid":"171/2175","text":"V. Mey"},{"@pid":"20/1388","text":"F. Piras"},{"@pid":"171/2157","text":"G. L. L'Abbate"},{"@pid":"58/2285","text":"Simone Marini"},{"@pid":"171/2163","text":"D. Fratta"},{"@pid":"171/2149","text":"S. Bonaretti"},{"@pid":"171/2254","text":"S. Trasciatti"}]},"title":"Preclinical Tests for Cerebral Stroke.","venue":"ASONAM","pages":"1063-1067","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ZiniPBPMPLMFBT15","doi":"10.1145/2808797.2808816","ee":"https://doi.org/10.1145/2808797.2808816","url":"https://dblp.org/rec/conf/asunam/ZiniPBPMPLMFBT15"}, "url":"URL#3497295" }, { "@score":"1", "@id":"3497296", "info":{"authors":{"author":[{"@pid":"36/469-5","text":"Jun Zou 0005"},{"@pid":"77/2313","text":"Faramarz Fekri"},{"@pid":"45/6772","text":"Steven W. McLaughlin"}]},"title":"Mining Streaming Tweets for Real-Time Event Credibility Prediction in Twitter.","venue":"ASONAM","pages":"1586-1589","year":"2015","type":"Conference and Workshop Papers","access":"closed","key":"conf/asunam/ZouFM15","doi":"10.1145/2808797.2809347","ee":"https://doi.org/10.1145/2808797.2809347","url":"https://dblp.org/rec/conf/asunam/ZouFM15"}, "url":"URL#3497296" }, { "@score":"1", "@id":"3646590", "info":{"authors":{"author":[{"@pid":"p/JianPei","text":"Jian Pei"},{"@pid":"s/FabrizioSilvestri","text":"Fabrizio Silvestri"},{"@pid":"t/JieTang","text":"Jie Tang 0001"}]},"title":"Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015, Paris, France, August 25 - 28, 2015","venue":"ASONAM","publisher":"ACM","year":"2015","type":"Editorship","key":"conf/asunam/2015","doi":"10.1145/2808797","ee":"https://doi.org/10.1145/2808797","url":"https://dblp.org/rec/conf/asunam/2015"}, "url":"URL#3646590" } ] } } } )