By Topic

Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom)

Date 3-5 Sept. 2012

Filter Results

Displaying Results 1 - 25 of 145
  • [Front cover]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (307 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xvi
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Message from the Organizing Committee

    Publication Year: 2012, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (97 KB) | HTML iconHTML
    Freely Available from IEEE
  • SocialCom 2012 Committee

    Publication Year: 2012, Page(s):xix - xxiii
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • PASSAT 2012 Committee

    Publication Year: 2012, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Workshop on Security and Privacy in Social Networks (SPSN 2012) Committees

    Publication Year: 2012, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Workshop on Context-Based Affect Recognition (CBAR 2012) Committees

    Publication Year: 2012, Page(s): xxvi
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • Workshop on Social Media for Human Computation (SoHuman 2012) Committees

    Publication Year: 2012, Page(s): xxvii
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Workshop on Exploring Stances in Interactions: Conceptual and Practical Issues in Social Signal Processing Research (ESI 2012) Committees

    Publication Year: 2012, Page(s): xxviii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Workshop on Wide Spectrum Social Signal Processing (WS3P 2012) Committees

    Publication Year: 2012, Page(s): xxix
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2012, Page(s):xxx - xxxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (121 KB)

    These keynote speeches discuss the following: Modeling Social Perception of Faces; and Smart and Secure? On the Security and Privacy of Smartphones. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Centrality Analysis, Role-Based Clustering, and Egocentric Abstraction for Heterogeneous Social Networks

    Publication Year: 2012, Page(s):1 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1563 KB) | HTML iconHTML

    The social network is a powerful data structure allowing the depiction of relationship information between entities. Recent researchers have proposed many successful methods on analyzing homogeneous social networks assuming only a single type of node and relation. Nevertheless, real-world complex networks are usually heterogeneous, which presumes a network can be composed of different types of nod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast Algorithm for Streaming Betweenness Centrality

    Publication Year: 2012, Page(s):11 - 20
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    Analysis of social networks is challenging due to the rapid changes of its members and their relationships. For many cases it impractical to recompute the metric of interest, therefore, streaming algorithms are used to reduce the total runtime following modifications to the graph. Centrality is often used for determining the relative importance of a vertex or edge in a graph. The vertex Betweennes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting the Evolution of Social Networks: Optimal Time Window Size for Increased Accuracy

    Publication Year: 2012, Page(s):21 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (569 KB) | HTML iconHTML

    This study investigates the data preparation process for predictive modelling of the evolution of complex networked systems, using an e -- mail based social network as an example. In particular, we focus on the selection of optimal time window size for building a time series of network snapshots, which forms the input of chosen predictive models. We formulate this issue as a constrained multi -- o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Ego Network Structure in Online Social Networks

    Publication Year: 2012, Page(s):31 - 40
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Results about offline social networks demonstrated that the social relationships that an individual (ego) maintains with other people (alters) can be organised into different groups according to the ego network model. In this model the ego can be seen as the centre of a series of layers of increasing size. Social relationships between ego and alters in layers close to ego are stronger than those b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Task-Oriented Social Ego Network Generation via Dynamic Collaborator Selection

    Publication Year: 2012, Page(s):41 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (627 KB) | HTML iconHTML

    Social networks are social structures derived from general human societies based upon certain scope or relationships. People in social networks, rather than behaving randomly, are highly organized and cooperative. To study evolutions of social networks, existing random graph theories only provide global views on network evolutions. Nevertheless, the evolutions of a social network should be examine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User Behavior Modelling Approach for Churn Prediction in Online Games

    Publication Year: 2012, Page(s):51 - 60
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    Massively Multiplayer Online Role-Playing Games (MMORPGs) are persistent virtual environments where millions of players interact in an online manner. Game logs capture player activities in great detail and user behavior modeling approaches can help to build accurate models of player behavior from these logs. We are interested in modeling player churn behavior and we use a lifecycle-based approach ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Individual and Group Dynamics in the Reality Mining Corpus

    Publication Year: 2012, Page(s):61 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (546 KB) | HTML iconHTML

    Though significant progress has been made in recent years, traditional work in social networks has focused on static network analysis or dynamics in a large-scale sense. In this work, we explore ways in which temporal information from sociographic data can be used for the analysis and prediction of individual and group behavior in dynamic, real-world situations. Using the MIT Reality Mining corpus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Offensive Language in Social Media to Protect Adolescent Online Safety

    Publication Year: 2012, Page(s):71 - 80
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    Since the textual contents on online social media are highly unstructured, informal, and often misspelled, existing research on message-level offensive language detection cannot accurately detect offensive content. Meanwhile, user-level offensiveness detection seems a more feasible approach but it is an under researched area. To bridge this gap, we propose the Lexical Syntactic Feature (LSF) archi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Modeling and Analysis Framework for Privacy-Aware Systems

    Publication Year: 2012, Page(s):81 - 90
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    Nowadays, almost any software application deals with private information. However, effective tools that support the specification and implementation of privacy-aware systems are still missing. This work makes a step to address this issue. In this paper we present MAPaS, a model based framework for the modeling and analysis of privacy-aware systems. MAPaS provides a modeling language for the privac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • It's Not in Their Tweets: Modeling Topical Expertise of Twitter Users

    Publication Year: 2012, Page(s):91 - 100
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (533 KB) | HTML iconHTML

    One of the key challenges for users of social media is judging the topical expertise of other users in order to select trustful information sources about specific topics and to judge credibility of content produced by others. In this paper, we explore the usefulness of different types of user-related data for making sense about the topical expertise of Twitter users. Types of user-related data inc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ignorance Isn't Bliss: An Empirical Analysis of Attention Patterns in Online Communities

    Publication Year: 2012, Page(s):101 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    Online community managers work towards building and managing communities around a given brand or topic. Arisk imposed on such managers is that their community may die out and its utility diminish to users. Understanding what drives attention to content and the dynamics of discussions in a given community informs the community manager and/or host with the factors that are associated with attention,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.