By Topic

Social Computing (SocialCom), 2013 International Conference on

Date 8-14 Sept. 2013

Filter Results

Displaying Results 1 - 25 of 177
  • [Front cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (358 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (318 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - xvii
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • Message from the Organizing Committee and Committee Listings

    Publication Year: 2013, Page(s):xviii - xxiii
    Request permission for commercial reuse | PDF file iconPDF (329 KB) | HTML iconHTML
    Freely Available from IEEE
  • Sociometric Methods for Relevancy Analysis of Long Tail Science Data

    Publication Year: 2013, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (606 KB) | HTML iconHTML

    As the push towards electronic storage, publication, curation, and discoverability of research data collected in multiple research domains has grown, so too have the massive numbers of small to medium datasets that are highly distributed and not easily discoverable - a region of data that is sometimes referred to as the long tail of science. The rapidly increasing, sheer volume of these long tail ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scaling Deep Social Feeds at Pinterest

    Publication Year: 2013, Page(s):7 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    With the advent of Twitter, the follow model has become pervasive across social networks. The follow model enables users to follow other users i.e. subscribe to content created by other users, thereby, establishing the concept of a following feed for a user. At Pinterest, we continually store, update and serve feeds for millions of users and fan out millions of newly created pins/repins to thousan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MultiScale Modeling of Islamic Organizations in UK

    Publication Year: 2013, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    In this paper we utilize an efficient sparse inverse covariance matrix (precision matrix) estimation technique to identify a set of highly correlated discriminative perspectives. We develop a ranking system that utilizes ranked perspectives to map 26 UK Islamic organizations on a set of socio-cultural, political and behavioral scales based on their web corpus. We create a gold standard ranking of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding Information Credibility on Twitter

    Publication Year: 2013, Page(s):19 - 24
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (722 KB) | HTML iconHTML

    Increased popularity of microblogs in recent years brings about a need for better mechanisms to extract credible or otherwise useful information from noisy and large data. While there are a great number of studies that introduce methods to find credible data, there is no accepted credibility benchmark. As a result, it is hard to compare different studies and generalize from their findings. In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incongruity Versus Incongruity Resolution

    Publication Year: 2013, Page(s):25 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    In behavioral psychology, the "Incongruity Theory" is currently the most well-accepted explanation as the underlying mechanism behind humor. This theory postulates that humor is caused due to the playful violation of the subjective expectations of an agent, caused by the presence of incongruous stimuli in the agent's observations. But whether humor is caused merely due to the presence of incongruo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayesian Security Games for Controlling Contagion

    Publication Year: 2013, Page(s):33 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1076 KB) | HTML iconHTML

    Influence blocking games have been used to model adversarial domains with a social component, such as counterinsurgency. In these games, a mitigator attempts to minimize the efforts of an influencer to spread his agenda across a social network. Previous work has assumed that the influence graph structure is known with certainty by both players. However, in reality, there is often significant infor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trending Topics on Twitter Improve the Prediction of Google Hot Queries

    Publication Year: 2013, Page(s):39 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    Once every five minutes, Twitter publishes a list of trending topics by monitoring and analyzing tweets from its users. Similarly, Google makes available hourly a list of hot queries that have been issued to the search engine. In this work, we analyze the time series derived from the daily volume index of each trend, either by Twitter or Google. Our study on a real-world dataset reveals that about... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effect of Caching on a Model of Content and Access Provider Revenues in Information-centric Networks

    Publication Year: 2013, Page(s):45 - 50
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    In this paper, we consider a game between an Internet Service (access) Provider (ISP) and content provider (CP) on a platform of end-user demand. A price-convex demand-response is motivated based on the delay sensitive applications that are expected to be subjected to the assumed usage-priced priority service over best-effort service. Thus, we are considering a two-sided market with multiclass dem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-Driven Development of Information Flow-Secure Systems with IFlow

    Publication Year: 2013, Page(s):51 - 56
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3055 KB) | HTML iconHTML

    In our increasingly interconnected world, privacy can seem like an unattainable goal. We are surrounded by countless devices and web services that acquire and collect our personal data as we interact with them. In many cases, the confidentiality of such data is not guaranteed and is frequently (if not always intentionally) violated. Smartphone apps and Internet web services in particular are known... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Increased Awareness Can Impact Attitudes and Behaviors toward Online Privacy Protection

    Publication Year: 2013, Page(s):57 - 62
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    People on the Web are generating and disclosing an ever-increasing amounts of data, often without full awareness of who is recording what about them, and who is aggregating and linking pieces of data with context information, for a variety of purposes. Awareness can help users to be informed about what silently happens during their navigation while learning from disclosure of personal information ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Stochastic Models to Predict User Response in Social Media

    Publication Year: 2013, Page(s):63 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    User response to contributed content in online social media depends on many factors. These include how the site lays out new content, how frequently the user visits the site, how many friends the user follows, how active these friends are, as well as how interesting or useful the content is to the user. We present a stochastic modeling framework that relates a user's behavior to details of the sit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hoodsquare: Modeling and Recommending Neighborhoods in Location-Based Social Networks

    Publication Year: 2013, Page(s):69 - 74
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (694 KB) | HTML iconHTML

    Information garnered from activity on location-based social networks can be harnessed to characterize urban spaces and organize them into neighborhoods. We represent geographic points in the city using spatio-temporal information about Foursquare user check-ins and semantic information about places, with the goal of developing features to input into a novel neighborhood detection algorithm. The al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Place-Focused Model for Social Networks in Cities

    Publication Year: 2013, Page(s):75 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    The focused organization theory of social ties proposes that the structure of human social networks can be arranged around extra-network foci, which can include shared physical spaces such as homes, workplaces, restaurants, and so on. Until now, this has been difficult to investigate on a large scale, but the huge volume of data available from online location-based social services now makes it pos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does Love Change on Twitter? The Dynamics of Topical Conversations in Microblogging

    Publication Year: 2013, Page(s):81 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    Discovering automatically what people are talking about on social media with respect to a particular topic would be useful since it would give insight into how people perceive different topics. However, identifying trending terms words within a topical conversation is a difficult task. We take an information retrieval approach and use tf-idf to identify words that are more frequent in a focal conv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantifying Social Influence in Epinions

    Publication Year: 2013, Page(s):87 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    In many eCommerce websites and consumer review websites, users can review products they purchased as well as the reviews others wrote. Users can also rate each other as trusted or untrusted relationships. By studying a data set from Epinions, we examine and quantify the correlation between trust/distrust relationships among the users and their ratings of the reviews. We discover that there is a st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gang Networks, Neighborhoods and Holidays: Spatiotemporal Patterns in Social Media

    Publication Year: 2013, Page(s):93 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4218 KB) | HTML iconHTML

    Social media generated by location-services-enabled cellular devices produce enormous amounts of location-based content. Spatiotemporal analysis of such data facilitate new ways of modeling human behavior and mobility patterns. In this paper, we use over 10 millions geo-tagged tweets from the city of Los Angeles as observations of human movement and apply them to understand the relationships of ge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictability of User Behavior in Social Media: Bottom-Up v. Top-Down Modeling

    Publication Year: 2013, Page(s):102 - 107
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    Recent work has attempted to capture the behavior of users on social media by modeling them as computational units processing information. We propose to extend this perspective by explicitly examining the predictive power of such a view. We consider a network of fifteen thousand users on Twitter over a seven week period. To evaluate the predictability of the users, we apply two contrasting modelin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an Attribute Based Constraints Specification Language

    Publication Year: 2013, Page(s):108 - 113
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    Recently, attribute based access control (ABAC) has received considerable attention from the security community for its policy flexibility and dynamic decision making capabilities. In ABAC, authorization decisions are based on various attributes of entities involved in the access (e.g., users, subjects, objects, context, etc.). In an ABAC system, correct attribute assignment to different entities ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-Preserving Data Publishing Based on Utility Specification

    Publication Year: 2013, Page(s):114 - 121
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (793 KB) | HTML iconHTML

    Most existing privacy-preserving data publishing methods anonymize data based on some general utility measures. However, the anonymized data may not be useful to applications that have specific requirements for the data they use. In this paper, we propose a method for data users to describe some characteristics of the anonymized data, as a special requirement of some classification applications, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.