


default search action
Social Network Analysis and Mining, Volume 8
Volume 8, Number 1, December 2018
- Fabrizio Marozzo

, Alessandro Bessi:
Analyzing polarization of social media users and news sites during political campaigns. 1:1-1:13 - Ehsan Mohammady Ardehaly, Aron Culotta

:
Learning from noisy label proportions for classifying online social data. 2:1-2:18 - Tjeerd van Campen, Herbert Hamers, Bart Husslage

, Roy Lindelauf
:
A new approximation method for the Shapley value applied to the WTC 9/11 terrorist attack. 3:1-3:12 - Pin-Yu Chen, Baichuan Zhang

, Mohammad Al Hasan:
Incremental eigenpair computation for graph Laplacian matrices: theory and applications. 4:1-4:17 - Fabrício Olivetti de França, Denise Hideko Goya, Claudio Luis de Camargo Penteado

:
User profiling of the Twitter Social Network during the impeachment of Brazilian President. 5 - Elisa Mussumeci

, Flávio Codeço Coelho
:
Reconstructing news spread networks and studying its dynamics. 6 - Soumi Dutta

, Sujata Ghatak, Ratnadeep Dey, Asit Kumar Das, Saptarshi Ghosh:
Attribute selection for improving spam classification in online social networks: a rough set theory-based approach. 7 - Ilhem Feddaoui, Faîçal Felhi, Jalel Akaichi

:
Multidimensional user profile construction for Web services selection: social networks case study. 8 - Yannick Léo, Márton Karsai

, Carlos Sarraute
, Eric Fleury:
Correlations and dynamics of consumption patterns in social-economic networks. 9 - Jing Tang

, Xueyan Tang, Junsong Yuan
:
An efficient and effective hop-based approach for influence maximization in social networks. 10 - Nagendra Kumar

, Gopi Ande, Jessu Shirish Kumar, Manish Singh
:
Toward maximizing the visibility of content in social media brand pages: a temporal analysis. 11 - Despoina Antonakaki, Sotiris Ioannidis, Paraskevi Fragopoulou

:
Utilizing the average node degree to assess the temporal growth rate of Twitter. 12 - Kousik Das

, Sovan Samanta
, Madhumangal Pal:
Study on centrality measures in social networks: a survey. 13 - Alexander Strang

, Oliver Haynes, Nathan D. Cahill, Darren A. Narayan:
Generalized relationships between characteristic path length, efficiency, clustering coefficients, and density. 14 - Pivithuru Wijegunawardana

, Vatsal Ojha, Ralucca Gera
, Sucheta Soundarajan:
Sampling dark networks to locate people of interest. 15 - Vachik S. Dave

, Mohammad Al Hasan, Baichuan Zhang, Chandan K. Reddy
:
Predicting interval time for reciprocal link creation using survival analysis. 16 - Yike Liu

, Tara Safavi, Neil Shah, Danai Koutra
:
Reducing large graphs to small supergraphs: a unified approach. 17 - Yasin N. Silva

, Deborah L. Hall
, Christopher Rich:
BullyBlocker: toward an interdisciplinary approach to identify cyberbullying. 18 - Jooyoung Lee

, Rasheed Hussain
, Victor Rivera, Davlatbek Isroilov:
Second-level degree-based entity resolution in online social networks. 19 - Patricia Conde Céspedes

, Blaise Ngonmang, Emmanuel Viennet:
An efficient method for mining the maximal α-quasi-clique-community of a given node in complex networks. 20 - Germán Creamer, Bernardo Creamer:

Emissions abating technology adoption in a coal trading network. 21 - Supattana Sukrat, Borworn Papasratorn:

An architectural framework for developing a recommendation system to enhance vendors' capability in C2C social commerce. 22 - Mohammad Ghane'i-Ostad, Hamed Vahdat-Nejad, Majid Abdolrazzagh-Nezhad

:
Detecting overlapping communities in LBSNs by fuzzy subtractive clustering. 23 - Xiaotao Gu, Hong Yang, Jie Tang, Jing Zhang, Fanjin Zhang, Debing Liu, Wendy Hall

, Xiao Fu:
Profiling Web users using big data. 24 - Haeran Cho

, Yi Yu
:
Link prediction for interdisciplinary collaboration via co-authorship network. 25 - Eisha Nathan, David A. Bader

:
Incrementally updating Katz centrality in dynamic graphs. 26 - Dima Kagan

, Yuval Elovici, Michael Fire:
Generic anomalous vertices detection utilizing a link prediction algorithm. 27 - Kashfia Sailunaz, Manmeet Dhaliwal, Jon G. Rokne, Reda Alhajj:

Emotion detection from text and speech: a survey. 28:1-28:26 - Taufik Sutanto

, Richi Nayak
:
Fine-grained document clustering via ranking and its application to social media analytics. 29:1-29:19 - Hiba Sebei

, Mohamed Ali Hadj Taieb
, Mohamed Ben Aouicha
:
Review of social media analytics process and Big Data pipeline. 30:1-30:28 - Andreea Nita

, Cristiana Maria Ciocanea, Steluta Manolache, Laurentiu Rozylowicz
:
A network approach for understanding opportunities and barriers to effective public participation in the management of protected areas. 31:1-31:11 - Negar Emami, Niloofar Mozafari

, Ali Hamzeh
:
Continuous state online influence maximization in social network. 32:1-32:17 - Hamidreza Mahyar, Rouzbeh Hasheminezhad, Elaheh Ghalebi, Ali Nazemian, Radu Grosu, Ali Movaghar, Hamid R. Rabiee

:
Identifying central nodes for information flow in social networks using compressive sensing. 33:1-33:24 - Amin Mahmoudi

, Mohd Ridzwan Yaakub
, Azuraliza Abu Bakar:
A new method to discretize time to identify the milestones of online social networks. 34:1-34:20 - Maryam Zamanian

, Farzaneh Zolala
, Ali Akbar Haghdoost, Mohammad Reza Baneshi
:
Effect of estimation method, definition of ratio, and the plausible range in estimating social network size. 35:1-35:7 - Sorin Adam Matei

, Amani Abu Jabal
, Elisa Bertino:
Social-collaborative determinants of content quality in online knowledge production systems: comparing Wikipedia and Stack Overflow. 36:1-36:16 - Sean M. Fitzhugh, Arwen H. DeCostanza:

Procure, persist, perish: communication tie dynamics in a disrupted task environment. 37:1-37:22 - Elaheh Raisi

, Bert Huang
:
Weakly supervised cyberbullying detection with participant-vocabulary consistency. 38:1-38:17 - Diego Perna, Roberto Interdonato, Andrea Tagarelli

:
Learning to lurker rank: an evaluation of learning-to-rank methods for lurking behavior analysis. 39:1-39:21 - Majed Al Zayer

, Mehmet Hadi Gunes:
Exploring visual impairment awareness campaigns on Twitter. 40:1-40:16 - Razieh Malekhosseini, Mehdi Hosseinzadeh

, Keyvan Navi:
An investigation into the requirements of privacy in social networks and factors contributing to users' concerns about violation of their privacy. 41:1-41:24 - Akrati Saxena

, Ralucca Gera
, S. R. S. Iyengar:
Estimating degree rank in complex networks. 42:1-42:20 - Hongyi Zhang

, Xingyu Niu, Irwin King
, Michael R. Lyu:
Overlapping community detection with preference and locality information: a non-negative matrix factorization approach. 43:1-43:14 - Jerry Scripps

, Christian Trefftz, Zachary Kurmas:
The difference between optimal and germane communities. 44:1-44:19 - Ahmet Anil Müngen

, Mehmet Kaya
:
Extracting abstract and keywords from context for academic articles. 45:1-45:11 - Yue Feng, Fattane Zarrinkalam, Ebrahim Bagheri, Hossein Fani, Feras N. Al-Obeidat

:
Entity linking of tweets based on dominant entity candidates. 46:1-46:16 - Negar Ahmadi, Rene M. H. Besseling, Mykola Pechenizkiy

:
Assessment of visibility graph similarity as a synchronization measure for chaotic, noisy and stochastic time series. 47:1-47:17 - Brian Heredia

, Joseph D. Prusa, Taghi M. Khoshgoftaar:
Social media for polling and predicting United States election outcome. 48:1-48:16 - Ahmad Hany Hossny, Terry Moschuo, Grant Osborne, Lewis Mitchell

, Nick Lothian:
Enhancing keyword correlation for event detection in social networks using SVD and k-means: Twitter case study. 49:1-49:10 - Sonia Khetarpaul

, S. K. Gupta, L. Venkata Subramaniam:
Mining optimal meeting points for moving users in spatio-temporal space. 50:1-50:16 - Yingjie Shi, Xuechang Zhu

, Bin Liu, Lei Li:
Social networks and the wages of job seekers: the case of China. 51:1-51:12 - Shuhan Yuan, Xintao Wu

, Yang Xiang:
Incorporating pre-training in long short-term memory networks for tweet classification. 52:1-52:16 - Zahra Mousavilou, Rozita Jamili Oskouei

:
An optimal method for URL design of webpage journals. 53:1-53:8 - Jisun An

, Haewoon Kwak, Soon-Gyo Jung, Joni Salminen, Bernard J. Jansen:
Customer segmentation using online platforms: isolating behavioral and demographic segments for persona creation via aggregated user data. 54:1-54:19 - Yaser Sobhanifard

, Ghodrat Allah Balighi:
Emotional modeling of the green purchase intention improvement using the viral marketing in the social networks. 55:1-55:8 - Arif Mohaimin Sadri

, Samiul Hasan
, Satish V. Ukkusuri, Juan Esteban Suarez Lopez:
Analysis of social interaction network properties and growth on Twitter. 56:1-56:13 - Mohammed Al-Taie

, Seifedine Nimer Kadry
, Obasa Isiaka Adekunle:
Understanding expert finding systems: domains and techniques. 57:1-57:9 - Monali Bordoloi

, Saroj K. Biswas
:
Keyword extraction from micro-blogs using collective weight. 58:1-58:16 - Luís Cavique

, Nuno C. Marques
, António Gonçalves:
A data reduction approach using hypergraphs to visualize communities and brokers in social networks. 60:1-60:17 - Matthieu Latapy

, Tiphaine Viard
, Clémence Magnien:
Stream graphs and link streams for the modeling of interactions over time. 61:1-61:29 - Ghita Mezzour, Kathleen M. Carley, L. Richard Carley:

Remote assessment of countries' cyber weapon capabilities. 62:1-62:15 - Manika Lamba

, Margam Madhusudhan
:
Application of sentiment analysis in libraries to provide temporal information service: a case study on various facets of productivity. 63:1-63:12 - Bhavtosh Rath, Wei Gao

, Jing Ma
, Jaideep Srivastava:
Utilizing computational trust to identify rumor spreaders on Twitter. 64:1-64:16 - Radhika Arava

:
Community detection using coordination games. 65:1-65:13 - Rishi Ranjan Singh, S. R. S. Iyengar, Shubham Chaudhary, Manas Agarwal:

An efficient heuristic for betweenness estimation and ordering. 66:1-66:27

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














