


default search action
Social Network Analysis and Mining, Volume 8
Volume 8, Number 1, December 2018
- Fabrizio Marozzo
, Alessandro Bessi:
Analyzing polarization of social media users and news sites during political campaigns. 1:1-1:13 - Ehsan Mohammady Ardehaly, Aron Culotta
:
Learning from noisy label proportions for classifying online social data. 2:1-2:18 - Tjeerd van Campen, Herbert Hamers, Bart Husslage
, Roy Lindelauf
:
A new approximation method for the Shapley value applied to the WTC 9/11 terrorist attack. 3:1-3:12 - Pin-Yu Chen, Baichuan Zhang
, Mohammad Al Hasan:
Incremental eigenpair computation for graph Laplacian matrices: theory and applications. 4:1-4:17 - Fabrício Olivetti de França, Denise Hideko Goya, Claudio Luis de Camargo Penteado
:
User profiling of the Twitter Social Network during the impeachment of Brazilian President. 5 - Elisa Mussumeci
, Flávio Codeço Coelho
:
Reconstructing news spread networks and studying its dynamics. 6 - Soumi Dutta
, Sujata Ghatak, Ratnadeep Dey, Asit Kumar Das, Saptarshi Ghosh:
Attribute selection for improving spam classification in online social networks: a rough set theory-based approach. 7 - Ilhem Feddaoui, Faîçal Felhi, Jalel Akaichi
:
Multidimensional user profile construction for Web services selection: social networks case study. 8 - Yannick Léo, Márton Karsai
, Carlos Sarraute
, Eric Fleury:
Correlations and dynamics of consumption patterns in social-economic networks. 9 - Jing Tang
, Xueyan Tang, Junsong Yuan
:
An efficient and effective hop-based approach for influence maximization in social networks. 10 - Nagendra Kumar
, Gopi Ande, Jessu Shirish Kumar, Manish Singh
:
Toward maximizing the visibility of content in social media brand pages: a temporal analysis. 11 - Despoina Antonakaki, Sotiris Ioannidis, Paraskevi Fragopoulou
:
Utilizing the average node degree to assess the temporal growth rate of Twitter. 12 - Kousik Das
, Sovan Samanta
, Madhumangal Pal:
Study on centrality measures in social networks: a survey. 13 - Alexander Strang
, Oliver Haynes, Nathan D. Cahill, Darren A. Narayan:
Generalized relationships between characteristic path length, efficiency, clustering coefficients, and density. 14 - Pivithuru Wijegunawardana
, Vatsal Ojha, Ralucca Gera
, Sucheta Soundarajan:
Sampling dark networks to locate people of interest. 15 - Vachik S. Dave
, Mohammad Al Hasan, Baichuan Zhang, Chandan K. Reddy
:
Predicting interval time for reciprocal link creation using survival analysis. 16 - Yike Liu
, Tara Safavi, Neil Shah, Danai Koutra
:
Reducing large graphs to small supergraphs: a unified approach. 17 - Yasin N. Silva
, Deborah L. Hall
, Christopher Rich:
BullyBlocker: toward an interdisciplinary approach to identify cyberbullying. 18 - Jooyoung Lee, Rasheed Hussain
, Victor Rivera, Davlatbek Isroilov:
Second-level degree-based entity resolution in online social networks. 19 - Patricia Conde Céspedes
, Blaise Ngonmang, Emmanuel Viennet:
An efficient method for mining the maximal α-quasi-clique-community of a given node in complex networks. 20 - Germán Creamer, Bernardo Creamer:
Emissions abating technology adoption in a coal trading network. 21 - Supattana Sukrat, Borworn Papasratorn:
An architectural framework for developing a recommendation system to enhance vendors' capability in C2C social commerce. 22 - Mohammad Ghane'i-Ostad, Hamed Vahdat-Nejad, Majid Abdolrazzagh-Nezhad
:
Detecting overlapping communities in LBSNs by fuzzy subtractive clustering. 23 - Xiaotao Gu, Hong Yang, Jie Tang, Jing Zhang, Fanjin Zhang, Debing Liu, Wendy Hall
, Xiao Fu:
Profiling Web users using big data. 24 - Haeran Cho
, Yi Yu
:
Link prediction for interdisciplinary collaboration via co-authorship network. 25 - Eisha Nathan, David A. Bader
:
Incrementally updating Katz centrality in dynamic graphs. 26 - Dima Kagan
, Yuval Elovici, Michael Fire:
Generic anomalous vertices detection utilizing a link prediction algorithm. 27 - Kashfia Sailunaz, Manmeet Dhaliwal, Jon G. Rokne, Reda Alhajj:
Emotion detection from text and speech: a survey. 28:1-28:26 - Taufik Sutanto
, Richi Nayak
:
Fine-grained document clustering via ranking and its application to social media analytics. 29:1-29:19 - Hiba Sebei
, Mohamed Ali Hadj Taieb
, Mohamed Ben Aouicha
:
Review of social media analytics process and Big Data pipeline. 30:1-30:28 - Andreea Nita
, Cristiana Maria Ciocanea, Steluta Manolache, Laurentiu Rozylowicz
:
A network approach for understanding opportunities and barriers to effective public participation in the management of protected areas. 31:1-31:11 - Negar Emami, Niloofar Mozafari
, Ali Hamzeh
:
Continuous state online influence maximization in social network. 32:1-32:17 - Hamidreza Mahyar, Rouzbeh Hasheminezhad, Elaheh Ghalebi, Ali Nazemian, Radu Grosu, Ali Movaghar, Hamid R. Rabiee
:
Identifying central nodes for information flow in social networks using compressive sensing. 33:1-33:24 - Amin Mahmoudi
, Mohd Ridzwan Yaakub
, Azuraliza Abu Bakar:
A new method to discretize time to identify the milestones of online social networks. 34:1-34:20 - Maryam Zamanian
, Farzaneh Zolala
, Ali Akbar Haghdoost, Mohammad Reza Baneshi
:
Effect of estimation method, definition of ratio, and the plausible range in estimating social network size. 35:1-35:7 - Sorin Adam Matei
, Amani Abu Jabal
, Elisa Bertino:
Social-collaborative determinants of content quality in online knowledge production systems: comparing Wikipedia and Stack Overflow. 36:1-36:16 - Sean M. Fitzhugh, Arwen H. DeCostanza:
Procure, persist, perish: communication tie dynamics in a disrupted task environment. 37:1-37:22 - Elaheh Raisi
, Bert Huang
:
Weakly supervised cyberbullying detection with participant-vocabulary consistency. 38:1-38:17 - Diego Perna, Roberto Interdonato, Andrea Tagarelli
:
Learning to lurker rank: an evaluation of learning-to-rank methods for lurking behavior analysis. 39:1-39:21 - Majed Al Zayer
, Mehmet Hadi Gunes:
Exploring visual impairment awareness campaigns on Twitter. 40:1-40:16 - Razieh Malekhosseini, Mehdi Hosseinzadeh, Keyvan Navi:
An investigation into the requirements of privacy in social networks and factors contributing to users' concerns about violation of their privacy. 41:1-41:24 - Akrati Saxena
, Ralucca Gera
, S. R. S. Iyengar:
Estimating degree rank in complex networks. 42:1-42:20 - Hongyi Zhang
, Xingyu Niu, Irwin King
, Michael R. Lyu:
Overlapping community detection with preference and locality information: a non-negative matrix factorization approach. 43:1-43:14 - Jerry Scripps
, Christian Trefftz, Zachary Kurmas:
The difference between optimal and germane communities. 44:1-44:19 - Ahmet Anil Müngen
, Mehmet Kaya
:
Extracting abstract and keywords from context for academic articles. 45:1-45:11 - Yue Feng, Fattane Zarrinkalam, Ebrahim Bagheri, Hossein Fani, Feras N. Al-Obeidat
:
Entity linking of tweets based on dominant entity candidates. 46:1-46:16 - Negar Ahmadi, Rene M. H. Besseling, Mykola Pechenizkiy
:
Assessment of visibility graph similarity as a synchronization measure for chaotic, noisy and stochastic time series. 47:1-47:17 - Brian Heredia
, Joseph D. Prusa, Taghi M. Khoshgoftaar:
Social media for polling and predicting United States election outcome. 48:1-48:16 - Ahmad Hany Hossny, Terry Moschuo, Grant Osborne, Lewis Mitchell
, Nick Lothian:
Enhancing keyword correlation for event detection in social networks using SVD and k-means: Twitter case study. 49:1-49:10 - Sonia Khetarpaul
, S. K. Gupta, L. Venkata Subramaniam:
Mining optimal meeting points for moving users in spatio-temporal space. 50:1-50:16 - Yingjie Shi, Xuechang Zhu
, Bin Liu, Lei Li:
Social networks and the wages of job seekers: the case of China. 51:1-51:12 - Shuhan Yuan, Xintao Wu
, Yang Xiang:
Incorporating pre-training in long short-term memory networks for tweet classification. 52:1-52:16 - Zahra Mousavilou, Rozita Jamili Oskouei
:
An optimal method for URL design of webpage journals. 53:1-53:8 - Jisun An
, Haewoon Kwak, Soon-Gyo Jung, Joni Salminen, Bernard J. Jansen:
Customer segmentation using online platforms: isolating behavioral and demographic segments for persona creation via aggregated user data. 54:1-54:19 - Yaser Sobhanifard
, Ghodrat Allah Balighi:
Emotional modeling of the green purchase intention improvement using the viral marketing in the social networks. 55:1-55:8 - Arif Mohaimin Sadri
, Samiul Hasan
, Satish V. Ukkusuri, Juan Esteban Suarez Lopez:
Analysis of social interaction network properties and growth on Twitter. 56:1-56:13 - Mohammed Al-Taie
, Seifedine Nimer Kadry
, Obasa Isiaka Adekunle:
Understanding expert finding systems: domains and techniques. 57:1-57:9 - Monali Bordoloi
, Saroj K. Biswas:
Keyword extraction from micro-blogs using collective weight. 58:1-58:16 - Luís Cavique
, Nuno C. Marques
, António Gonçalves:
A data reduction approach using hypergraphs to visualize communities and brokers in social networks. 60:1-60:17 - Matthieu Latapy
, Tiphaine Viard
, Clémence Magnien:
Stream graphs and link streams for the modeling of interactions over time. 61:1-61:29 - Ghita Mezzour, Kathleen M. Carley, L. Richard Carley:
Remote assessment of countries' cyber weapon capabilities. 62:1-62:15 - Manika Lamba
, Margam Madhusudhan
:
Application of sentiment analysis in libraries to provide temporal information service: a case study on various facets of productivity. 63:1-63:12 - Bhavtosh Rath, Wei Gao
, Jing Ma
, Jaideep Srivastava:
Utilizing computational trust to identify rumor spreaders on Twitter. 64:1-64:16 - Radhika Arava
:
Community detection using coordination games. 65:1-65:13 - Rishi Ranjan Singh, S. R. S. Iyengar, Shubham Chaudhary, Manas Agarwal:
An efficient heuristic for betweenness estimation and ordering. 66:1-66:27

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.