By Topic

Advances in Social Networks Analysis and Mining (ASONAM), 2010 International Conference on

Date 9-11 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 99
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (380 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (204 KB)
    Freely Available from IEEE
  • Message from the ASONAM 2010 and OSINT-WM 2010 Program Chairs

    Publication Year: 2010, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (124 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the General Chair of ASONAM 2010

    Publication Year: 2010, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (137 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the General Chairs of OSINT-WM 2010

    Publication Year: 2010, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (120 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference sponsors

    Publication Year: 2010, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • OSINT-WM 2010 Symposium Sponsors

    Publication Year: 2010, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • ASONAM 2010 Conference Committee

    Publication Year: 2010, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • ASONAM 2010 Program Committee

    Publication Year: 2010, Page(s):xix - xxii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • External reviewers

    Publication Year: 2010, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • OSINT-WM 2010 Committee Members

    Publication Year: 2010, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • MSN-DS 2010 Workshop Committee Members

    Publication Year: 2010, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • ASONAM 2010 and OSINT-WM 2010 Invited Keynotes

    Publication Year: 2010, Page(s):xxvi - xxix
    Cited by:  Papers (48)
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • ASONAM 2010 and OSINT-WM 2010 Invited Talks

    Publication Year: 2010, Page(s):xxx - xxxi
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • OSINT-WM Inaugural Talk

    Publication Year: 2010, Page(s): xxxii
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • A Social Network Analysis and Mining Methodology for the Monitoring of Specific Domains in the Blogosphere

    Publication Year: 2010, Page(s):1 - 8
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (941 KB) | HTML iconHTML

    Whenever the question arises how a product, a personality, a technology or some other specific entity is perceived by the public, the blogosphere is a very good source of information. This is what usually interests business users from marketing or PR. Modern search services offer a rich set of tools to monitor or track the blogosphere as a whole, but the analysis with respect to a certain domain i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning from the Past: An Analysis of Person Name Corrections in DBLP Collection and Social Network Properties of Affected Entities

    Publication Year: 2010, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    Identifying real world persons by their name is a significant problem, especially for digital libraries like DBLP. Though there are a large number of algorithmic approaches, finding and correcting name-related inconsistencies is time-consuming and expensive. We introduce an extension to the DBLP collection which allows us to mine for modifications to name entities in a period of ten years. We use ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Structure of the Computer Science Knowledge Network

    Publication Year: 2010, Page(s):17 - 24
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1449 KB) | HTML iconHTML

    How is our knowledge organized? What research fields in computer science do exist? How are they interconnected? Previous work on knowledge mapping focused on building the map of all of sciences or a particular domain based on ISI published JCR (Journal Citation Report) dataset. Although this dataset covers most of important journals, it lacks of computer science conference and workshop proceedings... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business-Oriented Analysis of a Social Network of University Students: Informative Value of Individual and Relational Data Compared through Group Detection

    Publication Year: 2010, Page(s):25 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (721 KB) | HTML iconHTML

    Despites the great interest caused by social networks in Business Science, their analysis is rarely performed both in a global and systematic way in this field: most authors focus on parts of the studied network, or on a few nodes considered individually. This could be explained by the fact that practical extraction of social networks is a difficult and costly task, since the specific relational d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Improved Adolescent and Child Safety in MMOs

    Publication Year: 2010, Page(s):33 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (529 KB) | HTML iconHTML

    This paper presents an approach to providing better safety for adolescents playing online games. We highlight an emerging paedophile presence in online games and offer a general framework for the design of monitoring and alerting tools. Our method is to monitor and detect relationships forming with a child in online games, and alert if the relationship indicates an offline meeting with the child h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical Study of Social Features' Roles in Buyers' Complex Decision Making

    Publication Year: 2010, Page(s):41 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (470 KB) | HTML iconHTML

    This paper aims at studying the roles of social features (as obtained from social networking sources) in buyers' decision process when they are searching for products to buy. Through close observation of users' objective behavior, we have discovered the importance of different types of social features in supporting users to achieve a confident decision at the end. Improving suggestions are further... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Social Positions Using Simulation

    Publication Year: 2010, Page(s):48 - 55
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (507 KB) | HTML iconHTML

    Describing social positions and roles is an important topic within social network analysis. One approach is to compute a suitable equivalence relation on the nodes of the target network. One relation that is often used for this purpose is regular equivalence, or bisimulation, as it is known within the field of computer science. In this paper we consider a relation from computer science called simu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.