2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)

25-28 Aug. 2013

Filter Results

Displaying Results 1 - 25 of 265
  • [Front cover]

    Publication Year: 2013, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (534 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • [Title page ii]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):i - xvii
    Request permission for commercial reuse | PDF file iconPDF (12354 KB)
    Freely Available from IEEE
  • ASONAM 2013 message from steering chair

    Publication Year: 2013, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (47 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from IEEE/ACM ASONAM 2013 general chairs

    Publication Year: 2013, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (51 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome from the ASONAM 2013 program chairs

    Publication Year: 2013, Page(s):xx - xxi
    Request permission for commercial reuse | PDF file iconPDF (58 KB) | HTML iconHTML
    Freely Available from IEEE
  • ASONAM 2013 organizing committee

    Publication Year: 2013, Page(s):xxii - xxiii
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • ASONAM 2013 program committee

    Publication Year: 2013, Page(s):xxiii - xxviii
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Message from 2013 International Symposium on Foundations of Open Source Intelligence and Security Informatics chairs

    Publication Year: 2013, Page(s): xxix
    Request permission for commercial reuse | PDF file iconPDF (50 KB) | HTML iconHTML
    Freely Available from IEEE
  • FOSINT-SI 2013 symposium organizing committee

    Publication Year: 2013, Page(s): xxx
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • FOSINT-SI 2013 program committee

    Publication Year: 2013, Page(s):xxxi - xxxii
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Message from HI-BI-BI 2013 program chairs

    Publication Year: 2013, Page(s): xxxiii
    Request permission for commercial reuse | PDF file iconPDF (43 KB) | HTML iconHTML
    Freely Available from IEEE
  • HI-BI-BI 2013 symposium organizing committee

    Publication Year: 2013, Page(s): xxxiv
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • HI-BI-BI 2013 program committee

    Publication Year: 2013, Page(s):xxxv - xxxvi
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Some computational challenges in mining social media

    Publication Year: 2013, Page(s): xxxvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (34 KB)

    People of all walks of life use social media for communications and networking. Their active participation in numerous and diverse online activities continually generates massive amounts of social media data. This undoubtedly “big” data presents new challenges to data mining, including how to select salient features for social media data with varied relations, how to assess user vuln... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unraveling daily human mobility motifs

    Publication Year: 2013, Page(s): xxxviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (38 KB)

    Summary form only given. Time scales differentiate human mobility. While the mechanism for longtime scales has been studied, the underlying mechanism on the daily scale is still unrevealed. Here, we uncover the mechanism responsible for the daily mobility patterns by analyzing the temporal and spatial trajectories of thousands of persons as individual networks. Using the concept of motifs from net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Large graph mining - Patterns, explanations, and cascade analysis

    Publication Year: 2013, Page(s): xxxix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (37 KB)

    Summary form only given. What do graphs look like? How do they evolve over time? How does influence/news/viruses propagate, over time? We present a long list of static and temporal laws, and some recent observations on real graphs. We show that fractals and self-similarity can explain several of the observed patterns, and we conclude with cascade analysis and a surprising result on virus propagati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ASONAM 2013 panel: The role of network analysis and mining community in the era of big data

    Publication Year: 2013, Page(s): xl
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • The role of network analysis and mining in the era of big data: Panel summary

    Publication Year: 2013, Page(s):xli - xlii
    Request permission for commercial reuse | PDF file iconPDF (496 KB)
    Freely Available from IEEE
  • ASONAM 2013 tutorials

    Publication Year: 2013, Page(s):xliii - xlvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (45 KB)

    These tutorials discuss the following: Outlier Detection for Graph Data; Social and Behavioral Analytics (SBA): Mining Behaviors of a Socially Connected World; Big Graph Mining: Algorithms, Anomaly Detection, and Applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2013, Page(s):1499 - 1507
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • Analyzing the scalability of a social network of agents

    Publication Year: 2013, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    Social networks are ever-growing systems by inheritance. The increase in the number nodes in these systems often brings forth the need to add additional functionalities. However due to the distributed nature of social networks, system growth can be a challenging task. Therefore scalability of the system is of vital importance in the design of social networks. This research attempts to establish a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of organization hierarchy in technology adoption at the workplace

    Publication Year: 2013, Page(s):8 - 15
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    Popular social networking sites have revolutionized the way people interact on the Web, enabling rapid information dissemination and search. In an enterprise, understanding how information flows within and between organizational levels and business units is of great importance. Despite numerous studies in information diffusion in online social networks, little is known about factors that affect th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.