By Topic

Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM International Conference on

Date 26-29 Aug. 2012

Filter Results

Displaying Results 1 - 25 of 243
  • [Front cover]

    Publication Year: 2012 , Page(s): C4
    Save to Project icon | Request Permissions | PDF file iconPDF (947 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (29 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (117 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (118 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012 , Page(s): v - xx
    Save to Project icon | Request Permissions | PDF file iconPDF (227 KB)  
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2012 , Page(s): xxi
    Save to Project icon | Request Permissions | PDF file iconPDF (137 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2012 , Page(s): xxii
    Save to Project icon | Request Permissions | PDF file iconPDF (92 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from the Steering Chair

    Publication Year: 2012 , Page(s): xxiii
    Save to Project icon | Request Permissions | PDF file iconPDF (91 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • ASONAM 2012 Program Committee

    Publication Year: 2012 , Page(s): xxiv - xxix
    Save to Project icon | Request Permissions | PDF file iconPDF (104 KB)  
    Freely Available from IEEE
  • ASONAM 2012 Organizing Committee

    Publication Year: 2012 , Page(s): xxx - xxxi
    Save to Project icon | Request Permissions | PDF file iconPDF (45 KB)  
    Freely Available from IEEE
  • Message from the FOSINT-SI Local Chairs

    Publication Year: 2012 , Page(s): xxxii
    Save to Project icon | Request Permissions | PDF file iconPDF (103 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • FOSINT-SI 2012 Organizing Committee

    Publication Year: 2012 , Page(s): xxxiii
    Save to Project icon | Request Permissions | PDF file iconPDF (112 KB)  
    Freely Available from IEEE
  • FOSINT-SI 2012 Program Committee

    Publication Year: 2012 , Page(s): xxxiv - xxxvi
    Save to Project icon | Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • Message from the HI-BI-BI Program Chairs

    Publication Year: 2012 , Page(s): xxxvii
    Save to Project icon | Request Permissions | PDF file iconPDF (91 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • HI-BI-BI 2012 Organizing Committee

    Publication Year: 2012 , Page(s): xxxviii
    Save to Project icon | Request Permissions | PDF file iconPDF (98 KB)  
    Freely Available from IEEE
  • HI-BI-BI 2012 Program Committee

    Publication Year: 2012 , Page(s): xxxix - xl
    Save to Project icon | Request Permissions | PDF file iconPDF (122 KB)  
    Freely Available from IEEE
  • Panel and Keynotes

    Publication Year: 2012 , Page(s): xli - xlii
    Save to Project icon | Request Permissions | PDF file iconPDF (96 KB)  
    Freely Available from IEEE
  • Tutorials

    Publication Year: 2012 , Page(s): xliii - xlviii
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (77 KB)  

    Provides an abstract for each of the tutorial presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Large Social Networks Can Be Targeted for Viral Marketing with Small Seed Sets

    Publication Year: 2012 , Page(s): 1 - 8
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1445 KB) |  | HTML iconHTML  

    In a "tipping" model, each node in a social network, representing an individual, adopts a behavior if a certain number of his incoming neighbors previously held that property. A key problem for viral marketers is to determine an initial "seed" set in a network such that if given a property then the entire network adopts the behavior. Here we introduce a method for quickly finding seed sets that sc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Trilemma of Network Analysis

    Publication Year: 2012 , Page(s): 9 - 14
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (336 KB) |  | HTML iconHTML  

    The recent interest in network analysis is caused by the unprecedented accessibility to large datasets: there are huge, publicly available databases on protein-protein-interactions, air transportation, and street maps which easily lend themselves to a network representation. Once a network is created, all types of path-based network analytic measures can be easily applied: typical examples are cen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Link and Node Analysis of Gender Based Collaborations in Turkish Social Sciences

    Publication Year: 2012 , Page(s): 15 - 19
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (258 KB) |  | HTML iconHTML  

    This paper examines impact of gender both on publication productivity and on patterns of scientific collaborations in social sciences in Turkey. Bibliographic data on local publications in Turkey is used. It consists of 7835 papers written by 6738 scientists. Findings suggest that (1) there are gender differences at publication productivity, participation, presence and contribution, that (2) there... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Expansion of Tweet Contents for Enhanced Event Detection in Twitter

    Publication Year: 2012 , Page(s): 20 - 24
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (316 KB) |  | HTML iconHTML  

    This paper aims to enhance event detection methods in a micro-blogging platform, namely Twitter. The enhancement technique we propose is based on lexico-semantic expansion of tweet contents while applying document similarity and clustering algorithms. Considering the length limitations and idiosyncratic spelling in Twitter environment, it is possible to take advantage of word similarities and to e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social-Based Conceptual Links: Conceptual Analysis Applied to Social Networks

    Publication Year: 2012 , Page(s): 25 - 29
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (669 KB) |  | HTML iconHTML  

    In this work, we propose a novel approach for the discovery of frequent patterns in a social network on the basis of both vertex attributes and link frequency. With an analogy to the traditional task of mining frequent item sets, we show that the issue addressed can be formulated in terms of a conceptual analysis that elicits conceptual links. A social-based conceptual link is a synthetic represen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring topological robustness of networks under sustained targeted attacks

    Publication Year: 2012 , Page(s): 38 - 45
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (306 KB) |  | HTML iconHTML  

    In this paper, we introduce a measure to analyse the structural robustness of complex networks, which is specifically applicable in scenarios of targeted, sustained attacks. The measure is based on the changing size of the largest component as the network goes through disintegration. We argue that the measure can be used to quantify and compare the effectiveness of various attack strategies. Apply... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing User Retweet Behavior on Twitter

    Publication Year: 2012 , Page(s): 46 - 50
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (229 KB) |  | HTML iconHTML  

    This paper provides a deep analysis of user retweet behavior on Twitter. While previous works about analyzing retweet have mainly focused on predicting the retweetability of each tweet, they lacked interpretations at an individual level. In this paper, we perform a general analysis of retweet behavior from the perspective of individual users. Specifically, we train a prediction model to forecast w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.