19-21 Oct. 2011
Filter Results
-
[Title page]
Publication Year: 2011, Page(s):i - xv
|
PDF (164 KB)
-
Core/periphery structure versus clustering in international weblogs
Publication Year: 2011, Page(s):1 - 6When analyzing social networks, centrality and community identification are among the most popular topics for researchers. Depending on their motivation and the resulting hypothesis, they usually focus on one of these two structural properties, leaving the other aspect aside. In this paper we investigate the relation between structural centralization, which follows a core/periphery model, and stru... View full abstract»
-
What did you say? A cross-cultural analysis of the distributive communicative behaviors of global virtual teams
Publication Year: 2011, Page(s):7 - 12
Cited by: Papers (2)In this empirical study, the general research question is “How do cultural values impact the global virtual teams (GVTs) practices when they communicate and collaborate using computer mediated communication (CMC)?” In particular, we explore the phenomenon of Malaysian GVTs working with culturally diverse members at a distance. In order to obtain in-depth understanding of such phenomenon, we employ... View full abstract»
-
Simulation of Online Social Networks with Krowdix
Publication Year: 2011, Page(s):13 - 18Online Social Networks (OSNs) are a key phenomenon of Internet. Simulations are widely used in their study as means to harness their size and complexity, and to overcome the difficulties to set up experiments in real environments. However, these tools are still limited. They are usually focused on the structure of relationships and emulate changes only from statistical data. This approach is unsui... View full abstract»
-
Social relevance of topological communities in ad hoc communication networks
Publication Year: 2011, Page(s):19 - 24
Cited by: Papers (2)In this article, we investigate the social relevance of dynamic community structures that can be determined on dynamic communication networks. We first present and validate SAND/SHARC (Stability And Network Dynamics over Sharper Heuristic for Assignment of Robust Communities), a distributed algorithm for community detection. Then, based on real-world communication traces and social information, we... View full abstract»
-
Towards the implementation of an internet-based neighbourhood watch scheme-Impacts of inclusive technologies on societies
Publication Year: 2011, Page(s):25 - 30
Cited by: Papers (1)In this paper we discuss the current state of our work regarding the development and planned in-situ testing of a computer-based system to enhance community relations through the Neighbourhood Watch scheme. The system is intended for use in a community to help the residents interact with each other more easily and to encourage the reporting of suspicious behaviour or crime. We discuss some details... View full abstract»
-
Comparison of influence metrics in information diffusion networks
Publication Year: 2011, Page(s):31 - 36The importance of social networks has pushed the analysis of the interactions among their users. The fact that a user may influence their friends or the friends of their friends makes the study of these social interactions necessary for many disciplines. We design a flexible model that can be mapped to many social-like networks. Specifically, we study and compare three of these networks: Enron, Tw... View full abstract»
-
A novel social network platform by using e-marketing and evaluating models
Publication Year: 2011, Page(s):37 - 41
Cited by: Papers (1)Social networking system is not just for seeking and keeping customers but it has also proven to be a highly effective business tool. On the other hand, E-Tourism marketing and its technology cause the change of power balance between the industries and the service companies by providing better harmony between organizations, practical and easier method of production, less error in input and output ... View full abstract»
-
Privacy-preserving profile matching using the social graph
Publication Year: 2011, Page(s):42 - 47
Cited by: Patents (1)We present a privacy-preserving protocol for users to test a match with potential new friends in an environment where all users cryptographically encrypt their private information. The following scenario is considered. Suppose that user Alice thinks that Bob might be a good new friend. So, Alice and the Online Social Network (representing Bob) engage in a two-party matching protocol. In this proto... View full abstract»
-
Distributed collaboration models for social networks
Publication Year: 2011, Page(s):48 - 53In this paper, we model social networks from a memory-consistency perspective, which is based on partial order constraints of interaction histories. Unlike previous research which focuses on studying social interaction, our modelling is targeted for virtual community application designers. An intuitive collaboration model (post-reply) is formally defined, where social network participants interact... View full abstract»
-
Primary role identification in dynamic social networks
Publication Year: 2011, Page(s):54 - 59
Cited by: Papers (1)Social networks often forms very complex structures that additionally change over time. Description of actors' roles in such structures requires to take into account this dynamics reflecting behavioral characteristics of the actors. A role can be defined as a sequence of different types of activities. Various types of activities are modeled by pattern subgraphs, whereas sequences of these activiti... View full abstract»
-
A bio-inspired algorithm for searching relationships in Social Networks
Publication Year: 2011, Page(s):60 - 65
Cited by: Papers (3)Nowadays the Social Networks are experiencing a growing importance. The reason of this is that they enable the information exchange among people, meeting people in the same field of work or establishing collaborations with other research groups. In order to manage social networks and to find people inside them, they are usually represented as graphs with persons as nodes and relationships between ... View full abstract»
-
Friendlink: Link prediction in social networks via bounded local path traversal
Publication Year: 2011, Page(s):66 - 71
Cited by: Papers (4)Online social networks (OSNs) like Facebook, Myspace, and Hi5 have become popular, because they allow users to easily share content or expand their social circle. OSNs recommend new friends to registered users based on local graph features (i.e. based on the number of common friends that two users share). However, OSNs do not exploit all different length paths of the network. Instead, they conside... View full abstract»
-
A computational model to textual extraction and construction of social and complex networks
Publication Year: 2011, Page(s):72 - 75This work aims presenting a computational modeling to extract specific data from textual repository, in order to build social and complex networks. These networks structures are implicit in texts. This paper presents the model process, which involves text mining by regular expressions, and the construction of networks. To validate the model, an experimental procedure was applied to build scientifi... View full abstract»
-
A new genetics-based diffusion model for social networks
Publication Year: 2011, Page(s):76 - 81
Cited by: Papers (2)A variety of stochastic diffusion models are used to simulate spreading processes in networks, but they focus on either one single object or exclusive objects spreading. In this paper, a genetics-based diffusion model (GDM) is introduced as a general model. It can simulate multiple objects with different relationships spreading in social networks. To simulate information diffusion, GDM regards an ... View full abstract»
-
Generating private recommendations in a social trust network
Publication Year: 2011, Page(s):82 - 87
Cited by: Papers (7)Recommender systems have become increasingly important in e-commerce as they can guide customers with finding personalized services and products. A variant of recommender systems that generates recommendations from a set of trusted people is recently getting more attention in social networks. However, people are concerned about their privacy as the information revealed in recommender systems, part... View full abstract»
-
A portable and extensible community object
Publication Year: 2011, Page(s):88 - 93
Cited by: Papers (1)Many community networks have emerged on the Internet. They provide various functionalities to serve the community users. However, most of the community networks lacks of the convenient tools in packaging the information users are interested in. Therefore, the information posted and exchanged in the community networks is not easy to be extracted and reused somewhere else. In another aspect, the fun... View full abstract»
-
Tracking changes in dynamic information networks
Publication Year: 2011, Page(s):94 - 101
Cited by: Papers (15)Social network analysis is a discipline that has emerged to analyze social structures and information networks to uncover patterns of interaction among the vertices in the network. Most social networks are dynamic, and studying the evolution of these networks over time could provide insight into the behavior of individuals expressed by the nodes in the graph and the flow of information among them.... View full abstract»
-
Category-based routing in social networks: Membership dimension and the small-world phenomenon
Publication Year: 2011, Page(s):102 - 107
Cited by: Papers (4)A classic experiment by Milgram shows that individuals can route messages along short paths in social networks, given only simple categorical information about recipients (such as “he is a prominent lawyer in Boston” or “she is a Freshman sociology major at Harvard”). That is, these networks have very short paths between pairs of nodes (the so-called small-world phenomenon); moreover, participants... View full abstract»
-
SoSIReČR - IT professional social network
Publication Year: 2011, Page(s):108 - 113This paper describes the concept of a social network of the ICT specialists in the regions of the Czech Republic. In particular, we focus on the web portal under development, i.e. a software tool serving for the network implementation. Associated activities concerning collecting and analyzing ICT requirements from companies and educational ICT knowledge of university graduates are presented. The n... View full abstract»
-
Social Media in the context of Academic Marketing — Case study: The Umwelt-Campus Blog
Publication Year: 2011, Page(s):114 - 119
Cited by: Papers (2)Academic Marketing is on the rise in Germany. So is Social Media Marketing. In this paper we present a concept for academic marketing based on a social media marketing strategy developed and implemented at the Environmental Campus Birkenfeld, a site of Trier University of Applied Sciences. We discuss the development and implementation of this strategy starting from an evaluation of the use and nee... View full abstract»
-
Social networking APIs for companies — An example of using the Facebook API for companies
Publication Year: 2011, Page(s):120 - 123
Cited by: Papers (2)The use and integration of social networks is becoming increasingly important to many companies. Such networks are used within a company not only to publish information, but also to recruit new customers. Of particular interest is the provision of a vehicle for direct, effective communication between the company and its customers. Most of the well-known social networks provide what are known as “A... View full abstract»
-
Context and social networks interaction modeling for context aware alert systems
Publication Year: 2011, Page(s):124 - 129Web 2.0 allows users to freely publish information regarding several subjects. Social content websites may take advantage of such by creating means for dissemination and creation of collaborative knowledge. However, an adequate environment is needed for the insertion of such information on social content websites. Mobile 2.0 incorporates some Web 2.0 concepts on mobile platforms using context-awar... View full abstract»
-
Solearn: A Social Learning Network
Publication Year: 2011, Page(s):130 - 135
Cited by: Papers (3)We have assisted the development of a significant number of e-learning systems, which have achieved great success in distance teaching and education, but most of these systems present some limitations and some disadvantages. Most of them are closed where learning resources are fixed and the adaptability, the flexibility, and social relations are ignored and in most cases are not taken into account... View full abstract»
-
Reconstruction of a social network graph from incomplete call detail records
Publication Year: 2011, Page(s):136 - 140
Cited by: Papers (1) | Patents (6)Real-life call detail data (CDR) are used to build a graph of a social network of telecommunication operator customers. Affiliation network is used in graph construction since CDR data are partially kept anonymous. A number of the resulting network properties are examined to prove the correctness of the graph construction algorithm. Cliques in the network and network dynamics are analyzed; suggest... View full abstract»
Abstract