default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 48 matches
- 2012
- Satyen Abrol, Latifur Khan, Bhavani Thuraisingham:
Tweeque: Spatio-Temporal Analysis of Social Networks for Location Mining Using Graph Partitioning. SocialInformatics 2012: 145-148 - Lule Ahmedi, Korab Rrmoku, Kadri Sylejmani:
Tourist Tour Planning Supported by Social Network Analysis. SocialInformatics 2012: 295-303 - Jae-wook Ahn, Jennifer Hammock, Cynthia Parr, Jennifer Preece, Ben Shneiderman, Katja Schulz, Derek L. Hansen, Dana Rotman, Yurong He:
Visually Exploring Social Participation in Encyclopedia of Life. SocialInformatics 2012: 149-156 - Rahmatollah Beheshti, Gita Sukthankar:
Extracting Agent-Based Models of Human Transportation Patterns. SocialInformatics 2012: 157-164 - Devon Callahan, Paulo Shakarian, Jeffrey Nielsen, Anthony N. Johnson:
Shaping Operations to Attack Robust Terror Networks. SocialInformatics 2012: 13-18 - Rafael Cappelletti, Nishanth Sastry:
IARank: Ranking Users on Twitter in Near Real-Time, Based on Their Information Amplification Potential. SocialInformatics 2012: 70-77 - Sherley Codio, Dennis G. Kafura, Manuel A. Pérez-Quiñones, Denis Gracanin, Andrea L. Kavanaugh:
A Case Study of Community Privacy. SocialInformatics 2012: 265-274 - Erfan Davami, Gita Sukthankar:
Online Learning of User-Specific Destination Prediction Models. SocialInformatics 2012: 40-43 - Mariam Elhussein, Keiichi Nakata:
Analysing the Factors That Influence Tag Choice Based on Semiotic Analysis and Activity Theory. SocialInformatics 2012: 96-105 - Aviad Elyashar, Michael Fire, Dima Kagan, Yuval Elovici:
Organizational Intrusion: Organization Mining Using Socialbots. SocialInformatics 2012: 7-12 - Terrill Fancott, Pankaj Kamthan, Nazlie Shahmir:
Towards Next Generation Requirements Engineering. SocialInformatics 2012: 328-331 - Xing Fang, Justin Zhan:
A Computational Framework for Detecting Malicious Actors in Communities. SocialInformatics 2012: 339-343 - Mathias Funk, Jun Hu, Matthias Rauterberg:
Socialize or Perish: Relating Social Behavior at a Scientific Conference to Publication Citations. SocialInformatics 2012: 113-120 - Samah Gad, Naren Ramakrishnan, Keith N. Hampton, Andrea L. Kavanaugh:
Bridging the Divide in Democratic Engagement: Studying Conversation Patterns in Advantaged and Disadvantaged Communities. SocialInformatics 2012: 165-176 - Christopher Griffin, Douglas Mercer, James Fan, Anna Cinzia Squicciarini:
Two Species Evolutionary Game Model of User and Moderator Dynamics. SocialInformatics 2012: 32-39 - Hao Han, Hidekazu Nakawatase, Keizo Oyama:
An Exploratory Analysis of Browsing Behavior of Web News on Twitter. SocialInformatics 2012: 86-95 - Derek L. Hansen, Dana Rotman, Elizabeth M. Bonsignore, Natasa Milic-Frayling, Eduarda Mendes Rodrigues, Marc A. Smith, Ben Shneiderman:
Do You Know the Way to SNA?: A Process Model for Analyzing and Visualizing Social Media Network Data. SocialInformatics 2012: 304-313 - Jan Hauffa, Tobias Lichtenberg, Georg Groh:
Towards an NLP-Based Topic Characterization of Social Relations. SocialInformatics 2012: 289-294 - Mostafa Karamibekr, Ali A. Ghorbani:
Sentiment Analysis of Social Issues. SocialInformatics 2012: 215-221 - Jihie Kim, Jae-Bong Yoo:
Role of Sentiment in Message Propagation: Reply vs. Retweet Behavior in Political Communication. SocialInformatics 2012: 131-136 - Giovanna Leone:
Nodding without Understanding: An Explorative Study of How Adolescents Listen to Their Teachers. SocialInformatics 2012: 137-144 - Xiong Liu, Kaizhi Tang, Jeffrey T. Hancock, Jiawei Han, Mitchell Song, Roger Xu, Vikram Manikonda, Bob Pokorny:
SocialCube: A Text Cube Framework for Analyzing Social Media Data. SocialInformatics 2012: 252-259 - Yoshifumi Masunaga:
Social Computing: Its Evolving Definition and Modeling in the Context of Collective Intelligence. SocialInformatics 2012: 314-319 - Motahareh Eslami Mehdiabadi, Hamid R. Rabiee, Mostafa Salehi:
Sampling from Diffusion Networks. SocialInformatics 2012: 106-112 - Christopher A. Miller, Jeffrey M. Rye:
Power and Politeness in Interactions: ADMIRE - A Tool for Deriving the Former from the Latter. SocialInformatics 2012: 177-184 - Folke Mitzlaff, Gerd Stumme:
Ranking Given Names: Algorithms and Evaluation Paradigms. SocialInformatics 2012: 185-191 - Roozbeh Nia, Fredrik Erlandsson, Prantik Bhattacharyya, Mohammad Rezaur Rahman, Henric Johnson, Shyhtsun Felix Wu:
SIN: A Platform to Make Interactions in Social Networks Accessible. SocialInformatics 2012: 205-214 - Jehwan Oh, Zoheb Borbora, Jaideep Srivastava:
Automatic Detection of Compromised Accounts in MMORPGs. SocialInformatics 2012: 222-227 - Rahman O. Oloritun, Anmol Madan, Alex Pentland, Inas Khayal:
Evolution of Social Encounters in Ad-Hoc Mobile Face-to-Face Interaction Networks. SocialInformatics 2012: 192-198 - Kirill Osipov, Gita Sukthankar:
Forming Effective Teams from Agents with Diverse Skill Sets. SocialInformatics 2012: 44-48
skipping 18 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-19 14:31 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint