


default search action
International Journal of Social Computing and Cyber-Physical Systems, Volume 1
Volume 1, Number 1, 2011
- Justin Zhan, Xing Fang:

Social computing: the state of the art. 1-12 - Baojun Qiu, Kristinka Ivanova, John Yen, Peng Liu, Frank E. Ritter:

Event-driven modelling of evolving social networks. 13-32 - Denis Helic

, Christoph Trattner, Markus Strohmaier, Keith Andrews:
Are tag clouds useful for navigation? A network-theoretic analysis. 33-55 - Eunyoung Moon, Sangki Han:

A qualitative method to find influencers using similarity-based approach in the blogosphere. 56-78 - Owen Macindoe, Whitman Richards:

Comparing networks using their fine structure. 79-97 - Juuso Karikoski, Matti Nelimarkka

:
Measuring social relations with multiple datasets. 98-113
Volume 1, Number 2, 2011
- Telmo L. T. Menezes

, Camille Roth, Jean-Philippe Cointet:
Finding the semantic-level precursors on a blog network. 115-134 - Stephen Kelley, Mark K. Goldberg, Konstantin Mertsalov, Malik Magdon-Ismail, William A. Wallace:

Overlapping communities in social networks. 135-159 - Shaozhi Ye, Shyhtsun Felix Wu:

Estimating the size of online social networks. 160-179 - Louis Lei Yu, Valerie King:

The evolution of friendships in Chinese online social networks. 180-205 - Georg Groh, Alexander Lehmann:

Deducing evidence for social situations from dynamic geometric interaction data. 206-222
Volume 1, Number 3, 2012
- Aaron Beach, Mike Gartrell, Richard Han

:
q-Anon: practical anonymity for social networks. 223-241 - Farzana Rahman, Md. Endadul Hoque, Ferdaus Ahmed Kawsar, Sheikh Iqbal Ahamed:

User privacy protection in pervasive social networking applications using PCO. 242-267 - Miao Jiang, William L. McGill, Yan Cao:

Participatory risk management: concept and illustration. 268-285 - Walter Bamberger, Josef Schlittenlacher, Klaus Diepold:

Ability-aware trust for vehicular networks. 286-307
Volume 1, Number 4, 2016
- Gerard Deepak, Sheeba Priyadarshini:

A hybrid framework for social tag recommendation using context driven social information. 312-325 - Sangeeta Rani, Kanwalvir Singh Dhindsa:

Malware detection techniques and tools for Android. 326-343 - Prabukumar Manoharan, Loganathan Agilandeeswari, M. Sai Praneeth:

Opinion mining for digital India scheme using fuzzy sets. 344-355 - Singh Vijendra

:
Big data characteristics, challenges, architectures, analytics and applications: a review. 356-386 - Swapnil S. Ninawe, Pallapa Venkataram:

A method of designing an access mechanism for social networks. 387-408

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














