


default search action
CASoN 2012: Sao Carlos, Brazil
- Fourth International Conference on Computational Aspects of Social Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012. IEEE 2012, ISBN 978-1-4673-4793-8
- Fuad Khan Baloch, Brian Cusack:
A discussion on Internet Governance. 1-7 - Catherine Bernard, Hervé Debar
, Salim Benayoune:
Cross-domain vulnerabilities over social networks. 8-13 - Lilian Berton, Alneu de Andrade Lopes:
Informativity-based graph: Exploring mutual kNN and labeled vertices for semi-supervised learning. 14-19 - Radoslaw Brendel, Henryk Krawczyk:
Primary role identification in e-mail networks using pattern subgraphs and sequence diagrams. 20-25 - Sarvenaz Choobdar, Pedro Manuel Pinto Ribeiro
, Fernando M. A. Silva
:
Event detection in evolving networks. 26-32 - Colin Cooper, Tomasz Radzik
, Yiannis Siantos:
Estimating network parameters using random walks. 33-40 - Bogdan Gliwa
, Anna Zygmunt, Aleksander Byrski
:
Graphical analysis of social group dynamics. 41-46 - Yoonjae Lee, Junseok Oh, Bong Gyou Lee:
Logical push framework for real-time SNS processing. 47-51 - Ana Carolina E. S. Lima, Leandro Nunes de Castro
:
Automatic sentiment analysis of Twitter messages. 52-57 - Bruno Vicente Alves de Lima, Vinícius Ponte Machado
:
Machine learning algorithms applied in automatic classification of social network users. 58-62 - Debanjan Mahata, Nitin Agarwal:
What does everybody know? Identifying event-specific sources from social media. 63-68 - Radoslaw Michalski
, Piotr Bródka
, Przemyslaw Kazienko
, Krzysztof Juszczyszyn:
Quantifying social network dynamics. 69-74 - Nils Ever Murrugarra-Llerena
, Lilian Berton, Alneu de Andrade Lopes:
Graph-based cross-validated committees ensembles. 75-80 - Soo Kyung Park, Jeong Ho Kwak, Bong Gyou Lee:
Is ARPU1; the right choice for wireless data-based communication services? 81-86 - Alysson Bolognesi Prado
, Maria Cecília Calani Baranauskas
:
Representing scientific associations through the lens of Actor-Network Theory. 87-92 - Martin Radvanský
, Milos Kudelka
, Václav Snásel:
Detection of head experts in social network. 93-98 - Atta-ur-Rahman
:
Performance of Modified Iterative Decoding Algorithm for Multilevel codes. 99-104 - Fatih Sen, Rolf T. Wigand, Nitin Agarwal, Debanjan Mahata, Halil Bisgin:
Identifying focal patterns in social networks. 105-108 - Layth Sliman
, Benoit Charroux
, Yvan Stroppa:
RunMyCode: An innovative platform for social production and evaluation of scientific research. 109-114 - Mohammad Soleimani-Pouri, Alireza Rezvanian
, Mohammad Reza Meybodi:
Solving maximum clique problem in stochastic graphs using learning automata. 115-119 - Syed Khairuzzaman Tanbeer, Carson Kai-Sang Leung
, Juan J. Cameron:
DIFSoN: Discovering influential friends from social networks. 120-125 - B. K. Tripathy
, Anirban Mitra
:
An algorithm to achieve k-anonymity and l-diversity anonymisation in social networks. 126-131 - Jorge Carlos Valverde-Rebaza
, Alneu de Andrade Lopes:
Structural link prediction using community information on Twitter. 132-137 - Katarzyna Wegrzyn-Wolska
, Lamine Bougueroua:
Tweets mining for French Presidential Election. 138-143 - Rolf T. Wigand, Nitin Agarwal, O. Isaac Osesina, Winfried Hering, M. Audrey Korsgaard, Arnold Picot, Marcus A. Drescher:
Social network indices as performance predictors in a virtual organization. 144-149 - Dante Zaupa, Cristiano André da Costa
, Jessica Silva, Jorge L. V. Barbosa
, Adenauer C. Yamin:
Mingle spontaneous social network. 150-154 - Sarka Zehnalova, Milos Kudelka Jr., Milos Kudelka, Václav Snásel:
Comparing two local methods for community detection in social networks. 155-160 - Lisa Ziemer, Tina Stahlschmidt, Norbert Kuhn:
Social media in the context of academic marketing: Case study: Evaluation of the Umwelt-Campus campaign. 161-166 - Ohood Saud Althobaiti
, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
Biometric access control for wireless nodes. 167-174 - Dherik Barison, Rodrigo Sanches Miani, Bruno Bogaz Zarpelão, Gean Davis Breda, Leonardo de Souza Mendes:
Evaluation of quality in encrypted VoIP calls. 175-180 - Kelton A. P. Costa, Clayton R. Pereira
, Rodrigo Nakamura, Luís A. M. Pereira, João Paulo Papa:
Boosting Optimum-Path Forest clustering through harmony Search and its applications for intrusion detection in computer networks. 181-185 - Dellys Hachemi Nabil, Karima Benatchba, Mouloud Koudil, Ahmed Bouridane:
Threats models on biometric systems: A comparative study. 186-191 - Loredana Liccardo, Massimiliano Rak
, Giuseppe Di Modica
, Orazio Tomarchio
:
Ontology-based Negotiation of security requirements in cloud. 192-197 - Joel Gibson, Robin Rondeau, Darren Eveleigh, Qing Tan:
Benefits and challenges of three cloud computing service models. 198-205 - Antonio Cuomo, Franco Frattolillo
, Federica Landolfi, Umberto Villano:
A simple and secure watermarking protocol. 206-211 - Ruben Jonathan Garcia Vargas, Eleazar Aguirre Anaya, Ramon Galeana Huerta, Alba Felix Moreno Hernandez:
Security controls for Android. 212-216 - Umesh Hodeghatta Rao Xavier, Bishwa Prakash Pati:
Study of internet security threats among home users. 217-221 - Aderonke Ikuomola, Adesina Simon Sodiya:
A credible cost-sensitive model for intrusion response selection. 222-227 - Sushil Jajodia
, Witold Litwin, Thomas J. E. Schwarz:
Securing password recovery through dispersion. 228-233 - Muhammad Khurram Khan
, Saru Kumari
, Mridul Kumar Gupta
:
Further cryptanalysis of 'A remote authentication scheme using mobile device'. 234-237 - Reine Lundin, Stefan Lindskog:
An investigation of entropy of selectively encrypted bitmap images. 238-243 - Massimo Ficco, Massimiliano Rak
, Beniamino Di Martino
:
An intrusion detection framework for supporting SLA assessment in Cloud Computing. 244-249 - Nader Nassar, G. Miller:
Method for a two dimensional honeypot to deter web bots in commerce systems. 250-256 - Ebenezer Paintsil:
Taxonomy of security risk assessment approaches for researchers. 257-262 - Michal Prilepok, Tomás Jezowicz, Jan Platos
, Václav Snásel:
Spam detection using compression and PSO. 263-270 - Murad A. Rassam
, Anazida Zainal
, Mohd Aizaini Maarof:
One-Class Principal Component Classifier for anomaly detection in wireless sensor network. 271-276 - Hana Rezanková
, Dusan Húsek:
Fuzzy clustering: Determining the number of clusters. 277-282 - Adesina S. Sodiya, Dada O. Aborisade, Aderonke Justina Ikuomola:
A survivability model for object-oriented software systems. 283-290 - Enrico Sorio, Alberto Bartoli
, Eric Medvet
:
A look at hidden web pages in Italian public administrations. 291-296 - Frank Yeong-Sung Lin, Yu-Shun Wang, Jing-Wei Wang, Chi-Hsiang Chan:
Effective network defense strategies to maximize system survivability of wireless mesh networks under malicious and jamming attacks. 297-302 - Bernd Zwattendorfer, Ivo Sumelong, Herbert Leitold:
Middleware architecture for cross-border eID. 303-308 - Sanchika Gupta, Padam Kumar, Anjali Sardana, Ajith Abraham:
A fingerprinting system calls approach for intrusion detection in a cloud environment. 309-314 - Sanchika Gupta, Padam Kumar, Anjali Sardana, Ajith Abraham:
A secure and lightweight approach for critical data security in cloud. 315-320 - Hmood Al-Dossari:
A reputation-based approach for consumer protection in Saudi Arabia. 321-326 - Brahim Batouche, Damien Nicolas, Hedi Ayed, Djamel Khadraoui:
Recommendation of travelling plan for elderly people according to their abilities and preferences. 327-332 - Evandro Caldeira, Gabriel Brandão, Adriano César Machado Pereira
:
Characterizing and preventing chargebacks in next generation web payments services. 333-338 - Sandir R. Campos, Ararigleno Almeida Fernandes, Rafael T. de Sousa Jr.
, Edison Pignaton de Freitas
, João Paulo Carvalho Lustosa da Costa
, Antonio Manuel Rubio Serrano, Daniel Da C. Rodrigues, Clauber T. Rodrigues:
Ontologic audit trails mapping for detection of irregularities in payrolls. 339-344 - Ulisses Cavalca, Caio Mário Mesquita, Adriano César Machado Pereira
, Eduardo G. Carrano:
A methodology for traffic shaping multiobjective optimization for next generation network. 345-350 - Milena Janáková:
Quality of service & process control: What is their efficiency in available IT products? 351-355 - Jonas Krutil, Milos Kudelka
, Václav Snásel:
Web page classification based on Schema.org collection. 356-360 - Kun Ma
, Runyuan Sun, Ajith Abraham:
Toward a lightweight framework for monitoring public clouds. 361-365 - Sanjay Kumar Malik, Syed Afzal Murtaza Rizvi
:
Ontology design towards web intelligence: A Sports Complex Ontology case study. 366-371 - George Markou, Ioannis Refanidis
:
Towards an automatic non-deterministic web Service Composition platform. 372-377 - Miguel L. Pardal
, Mark Harrison
, Sanjay E. Sarma, José Alves Marques:
Performance assessment of XACML authorizations for Supply Chain Traceability Web Services. 378-383 - Jan Platos
, Pavel Krömer
, Václav Snásel, Ajith Abraham:
Searching similar images - Vector quantization with S-tree. 384-388 - Haroldo Maria Teixeira Filho, Leonardo Guerreiro Azevedo:
CommonGOV: A consolidate approach for governance of service-oriented architecture. 389-394

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.