IEEE Transactions on Computational Social Systems

Issue 3 • Sept. 2017

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.

Filter Results

Displaying Results 1 - 16 of 16
  • Table of contents

    Publication Year: 2017, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (186 KB)
    Freely Available from IEEE
  • IEEE publication information

    Publication Year: 2017, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Computational Social Systems in a New Period: A Fast Transition Into the Third Axial Age

    Publication Year: 2017, Page(s):52 - 53
    Request permission for commercial reuse | PDF file iconPDF (179 KB) | HTML iconHTML
    Freely Available from IEEE
  • Maximizing the Influence and Profit in Social Networks

    Publication Year: 2017, Page(s):54 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1850 KB) | HTML iconHTML

    Influence maximization problem is to find a set of seeds in social networks such that the cascade influence is maximized. Traditional models assume that all nodes are willing to spread the influence once they are influenced, and they ignore the disparity between influence and profit of a product. In this paper, by considering the role that price plays in viral marketing, we propose price related (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks

    Publication Year: 2017, Page(s):65 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3715 KB) | HTML iconHTML

    Reconnaissance is the initial and essential phase of a successful advanced persistent threat (APT). In many cases, attackers collect information from social media, such as professional social networks. This information is used to select members that can be exploited to penetrate the organization. Detecting such reconnaissance activity is extremely hard because it is performed outside the organizat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Link Inference in Dynamic Heterogeneous Information Network: A Knapsack-Based Approach

    Publication Year: 2017, Page(s):80 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2979 KB) | HTML iconHTML

    Link inference, i.e., inferring links between vertices in a heterogeneous information network with heterogeneous vertices and edges, has been extensively studied in recent years. So far, many machine learning-based methods have been proposed for link inference, which can be classified into two categories, namely, supervised and unsupervised. Supervised methods perform well but highly rely on featu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Networked SIS Epidemics With Awareness

    Publication Year: 2017, Page(s):93 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2059 KB) | HTML iconHTML

    We study a susceptible-infected-susceptible epidemic process over a static contact network where the nodes have partial information about the epidemic state. They react by limiting their interactions with their neighbors when they believe the epidemic is currently prevalent. A node's awareness is weighted by the fraction of infected neighbors in their social network, and a global broadcast of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personalized Recommendation for Online Social Networks Information: Personal Preferences and Location-Based Community Trends

    Publication Year: 2017, Page(s):104 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1656 KB) | HTML iconHTML

    Microblogs, such as Twitter, are a way for users to express their opinions or share pieces of interesting news by posting relatively short messages (corpus) compared with the regular blogs. The volume of corpus updates that users receive daily is overwhelming. Also, as information diffuses from one user to another, some topics become of interest to only small groups of users, thus do not become wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sociocultural Models of Nuclear Deterrence

    Publication Year: 2017, Page(s):121 - 134
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3856 KB) | HTML iconHTML

    Through the development of a computational sociocultural model, we demonstrate the potential utility of a rapid-modeling approach for exploring the dynamics of nuclear deterrence. We review the past literature, showing how our model is influenced by both the domestic politics and constructivist paradigm models of nuclear deterrence. Our model development process incorporates expert elicitation int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Longitudinal Study of Google Play

    Publication Year: 2017, Page(s):135 - 149
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2352 KB) | HTML iconHTML

    The difficulty of large-scale monitoring of app markets affects our understanding of their dynamics. This is particularly true for dimensions such as app update frequency, control and pricing, the impact of developer actions on app popularity, as well as coveted membership in top app lists. In this paper, we perform a detailed temporal analysis on two datasets we have collected from the Google Pla... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Noncooperative Information Diffusion in Online Social Networks Under the Independent Cascade Model

    Publication Year: 2017, Page(s):150 - 162
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1406 KB) | HTML iconHTML

    In this paper, we present the first detailed analysis of influence maximization in noncooperative social networks under the Independent Cascade Model (ICM). We propose a new influence model based on the ICM and prove the approximation guarantees for influence maximization in noncooperative settings. We structure the influence diffusion into two stages, namely, seed node selection and influence dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CONGRESS: A Hybrid Reputation System for Coping with Rating Subjectivity

    Publication Year: 2017, Page(s):163 - 178
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1390 KB) | HTML iconHTML

    In electronic commerce, buyers and sellers conduct transactions without physical interactions. In reputation systems, the trustworthiness of sellers is achieved by aggregating the ratings shared by other buyers with whom the sellers have ever conducted transactions. However, the ratings provided by buyers for evaluating the same seller could be diverse due to their different judgment criteria, whi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Competitive Analysis of Bidding Behavior on Sponsored Search Advertising Markets

    Publication Year: 2017, Page(s):179 - 190
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1143 KB) | HTML iconHTML

    Online advertisers bidding in sponsored search auctions through Web search engines are experiencing unprecedentedly fierce competition in recent years, resulting in an obvious upward trend in bids submitted by advertisers. This bid inflation phenomenon poses significant threat to the overall stability and the effectiveness of sponsored search markets. Existing research efforts, however, do not yet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for Papers Special Issue on Integrating Social Networks with IoT Solutions

    Publication Year: 2017, Page(s):191 - 192
    Request permission for commercial reuse | PDF file iconPDF (1457 KB)
    Freely Available from IEEE
  • IEEE Transactions on Computational Social Systems society information

    Publication Year: 2017, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • IEEE Transactions on Computational Social Systems information for authors

    Publication Year: 2017, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Transactions on Computational Social Systems focuses on such topics as modeling, simulation, analysis and understanding of social systems from the quantitative and/or computational perspective.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Fei-Yue Wang
University of Chinese Academy of Science
Beijing, China
Email: feiyue.trans@gmail.com