首页 > 最新文献

2013 International Conference on Social Computing最新文献

英文 中文
A Serious Game Based on a Public Goods Experiment 基于公共物品实验的严肃游戏
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.116
Márcia Baptista, Hugo Damas, Joana Dimas, Guilherme Raimundo, R. Prada, C. Martinho, P. A. Santos, Jorge F. Peña
It has been pointed that public goods games lack experimental research in topics such as the study of the interaction of groups versus the interaction of individuals and effects of social identity and decision framing. Furthermore, the number of computational frameworks proposed to date to deploy these type of experiments is reduced. In this context, we propose the INVITE computational framework to serve as a useful research tool. The motivation behind the proposed framework is therefore straightforward: to allow researchers to be able to configure without difficulty public goods experiments where they can test their hypothesis regarding the behaviour of individuals, simulate behaviour of automated artificial intelligence and study the interaction between virtual agents and real persons. The greatest advantage of the INVITE framework is that it provides a high level of flexibility in the configuration of game theoretical paradigms. It is possible to configure simple structures such as the 2-player prisoner's dilemma or stag hunt as well as some of the most complex forms of inter-group conflicts such as team games. Accordingly, this framework allows an effortless parametrization, assisted by a tailored configuration tool, of a myriad of public goods games. Moreover, the 3D video game configured in the framework places the players in an immersive and engaging virtual environment where real-life conditions can be replicated and some circumstances, difficult to reproduce in real-life, such as life-threatening situations, can also be simulated. Given its characteristics, the proposed framework aims to represent an important contribution to the study of behaviour of both virtual and human players in scenarios of social conflict.
有人指出,公共产品游戏在群体互动与个人互动的研究、社会认同和决策框架的影响等主题上缺乏实验研究。此外,迄今为止提出的用于部署这些类型实验的计算框架的数量减少了。在这种情况下,我们建议将INVITE计算框架作为一种有用的研究工具。因此,提出的框架背后的动机很简单:允许研究人员能够轻松地配置公共产品实验,在这些实验中,他们可以测试他们关于个人行为的假设,模拟自动人工智能的行为,并研究虚拟代理与真人之间的互动。INVITE框架的最大优势在于,它在博弈论范式的配置中提供了高度的灵活性。可以配置简单的结构,如2人的囚徒困境或猎鹿,也可以配置一些最复杂的群体间冲突形式,如团队游戏。因此,在定制配置工具的帮助下,该框架可以轻松地对无数公共产品游戏进行参数化。此外,在框架中配置的3D视频游戏将玩家置于沉浸式和引人入胜的虚拟环境中,可以复制现实生活中的条件,并且还可以模拟一些在现实生活中难以再现的情况,例如危及生命的情况。鉴于其特点,所提出的框架旨在为研究虚拟和人类玩家在社会冲突场景中的行为做出重要贡献。
{"title":"A Serious Game Based on a Public Goods Experiment","authors":"Márcia Baptista, Hugo Damas, Joana Dimas, Guilherme Raimundo, R. Prada, C. Martinho, P. A. Santos, Jorge F. Peña","doi":"10.1109/SocialCom.2013.116","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.116","url":null,"abstract":"It has been pointed that public goods games lack experimental research in topics such as the study of the interaction of groups versus the interaction of individuals and effects of social identity and decision framing. Furthermore, the number of computational frameworks proposed to date to deploy these type of experiments is reduced. In this context, we propose the INVITE computational framework to serve as a useful research tool. The motivation behind the proposed framework is therefore straightforward: to allow researchers to be able to configure without difficulty public goods experiments where they can test their hypothesis regarding the behaviour of individuals, simulate behaviour of automated artificial intelligence and study the interaction between virtual agents and real persons. The greatest advantage of the INVITE framework is that it provides a high level of flexibility in the configuration of game theoretical paradigms. It is possible to configure simple structures such as the 2-player prisoner's dilemma or stag hunt as well as some of the most complex forms of inter-group conflicts such as team games. Accordingly, this framework allows an effortless parametrization, assisted by a tailored configuration tool, of a myriad of public goods games. Moreover, the 3D video game configured in the framework places the players in an immersive and engaging virtual environment where real-life conditions can be replicated and some circumstances, difficult to reproduce in real-life, such as life-threatening situations, can also be simulated. Given its characteristics, the proposed framework aims to represent an important contribution to the study of behaviour of both virtual and human players in scenarios of social conflict.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130830599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Religious Politicians and Creative Photographers: Automatic User Categorization in Twitter 宗教政治家和创意摄影师:Twitter中的自动用户分类
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.49
Claudia Wagner, S. Asur, J. Hailpern
Finding the ''right people'' is a central aspect of social media systems. Twitter has millions of users who have varied interests, professions and personalities. For those in fields such as advertising and marketing, it is important to identify certain characteristics of users to target. However, Twitter users do not generally provide sufficient information about themselves on their profile which makes this task difficult. In response, this work sets out to automatically infer professions (e.g., musicians, health sector workers, technicians) and personality related attributes (e.g., creative, innovative, funny) for Twitter users based on features extracted from their content, their interaction networks, attributes of their friends and their activity patterns. We develop a comprehensive set of latent features that are then employed to perform efficient classification of users along these two dimensions (profession and personality). Our experiments on a large sample of Twitter users demonstrate both a high overall accuracy in detecting profession and personality related attributes as well as highlighting the benefits and pitfalls of various types of features for particular categories of users.
找到“合适的人”是社交媒体系统的一个核心方面。Twitter拥有数以百万计的用户,他们有着不同的兴趣、职业和个性。对于广告和营销等领域的人来说,确定目标用户的某些特征是很重要的。然而,Twitter用户通常不会在他们的个人资料中提供足够的信息,这使得这项任务变得困难。作为回应,这项工作着手根据从Twitter用户的内容、他们的互动网络、他们的朋友的属性和他们的活动模式中提取的特征,自动推断他们的职业(例如,音乐家、卫生部门工作人员、技术人员)和与个性相关的属性(例如,创意、创新、有趣)。我们开发了一套全面的潜在特征,然后根据这两个维度(职业和个性)对用户进行有效的分类。我们在大量Twitter用户样本上的实验表明,在检测职业和个性相关属性方面,该方法具有很高的总体准确性,同时也突出了针对特定类别用户的各种类型特征的优点和缺点。
{"title":"Religious Politicians and Creative Photographers: Automatic User Categorization in Twitter","authors":"Claudia Wagner, S. Asur, J. Hailpern","doi":"10.1109/SocialCom.2013.49","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.49","url":null,"abstract":"Finding the ''right people'' is a central aspect of social media systems. Twitter has millions of users who have varied interests, professions and personalities. For those in fields such as advertising and marketing, it is important to identify certain characteristics of users to target. However, Twitter users do not generally provide sufficient information about themselves on their profile which makes this task difficult. In response, this work sets out to automatically infer professions (e.g., musicians, health sector workers, technicians) and personality related attributes (e.g., creative, innovative, funny) for Twitter users based on features extracted from their content, their interaction networks, attributes of their friends and their activity patterns. We develop a comprehensive set of latent features that are then employed to perform efficient classification of users along these two dimensions (profession and personality). Our experiments on a large sample of Twitter users demonstrate both a high overall accuracy in detecting profession and personality related attributes as well as highlighting the benefits and pitfalls of various types of features for particular categories of users.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126916608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Bot Detection Based on Social Interactions in MMORPGs 基于mmorpg社交互动的Bot检测
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.81
Jehwan Oh, Z. Borbora, Dhruv Sharma, J. Srivastava
The objective of this work is to detect the use of automated programs, known as game bots, based on social interactions in MMORPGs. Online games, especially MMORPGs, have become extremely popular among internet users in the recent years. Not only the popularity but also security threats such as the use of game bots and identity theft have grown manifold. As bot players can obtain unjustified assets without corresponding efforts, the gaming community does not allow players to use game bots. However, the task of identifying game bots is not an easy one because of the velocity and variety of their evolution in mimicking human behavior. Existing methods for detecting game bots have a few drawbacks like reducing immersion of players, low detection accuracy rate, and collision with other security programs. We propose a novel method for detecting game bots based on the fact that humans and game bots tend to form their social network in contrasting ways. In this work we focus particularly on the in game mentoring network from amongst several social networks. We construct a couple of new features based on eigenvector centrality to capture this intuition and establish their importance for detecting game bots. The results show a significant increase in the classification accuracy of various classifiers with the introduction of these features.
这项工作的目的是检测基于mmorpg社交互动的自动程序(游戏机器人)的使用情况。近年来,网络游戏,尤其是mmorpg,在互联网用户中变得非常流行。不仅是受欢迎程度,游戏机器人的使用和身份盗窃等安全威胁也在不断增加。因为bot玩家可以在不付出相应努力的情况下获得不合理的资产,所以游戏社区不允许玩家使用游戏bot。然而,识别游戏机器人的任务并不容易,因为它们模仿人类行为的进化速度和多样性。现有的检测游戏机器人的方法存在一些缺点,比如降低玩家的沉浸感,检测准确率低,以及与其他安全程序发生冲突。基于人类和游戏机器人倾向于以截然不同的方式形成社交网络这一事实,我们提出了一种检测游戏机器人的新方法。在这项工作中,我们特别关注来自多个社交网络的游戏内部指导网络。我们基于特征向量中心性构建了几个新特征来捕捉这种直觉,并确定它们对检测游戏机器人的重要性。结果表明,随着这些特征的引入,各种分类器的分类精度都有了显著的提高。
{"title":"Bot Detection Based on Social Interactions in MMORPGs","authors":"Jehwan Oh, Z. Borbora, Dhruv Sharma, J. Srivastava","doi":"10.1109/SocialCom.2013.81","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.81","url":null,"abstract":"The objective of this work is to detect the use of automated programs, known as game bots, based on social interactions in MMORPGs. Online games, especially MMORPGs, have become extremely popular among internet users in the recent years. Not only the popularity but also security threats such as the use of game bots and identity theft have grown manifold. As bot players can obtain unjustified assets without corresponding efforts, the gaming community does not allow players to use game bots. However, the task of identifying game bots is not an easy one because of the velocity and variety of their evolution in mimicking human behavior. Existing methods for detecting game bots have a few drawbacks like reducing immersion of players, low detection accuracy rate, and collision with other security programs. We propose a novel method for detecting game bots based on the fact that humans and game bots tend to form their social network in contrasting ways. In this work we focus particularly on the in game mentoring network from amongst several social networks. We construct a couple of new features based on eigenvector centrality to capture this intuition and establish their importance for detecting game bots. The results show a significant increase in the classification accuracy of various classifiers with the introduction of these features.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126392523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Predicting Spending Behavior Using Socio-mobile Features 利用社交手机功能预测消费行为
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.33
V. Singh, Laura Freeman, B. Lepri, A. Pentland
Human spending behavior is essentially social. This work motivates and grounds the use of mobile phone based social interaction features for classifying spending behavior. Using a data set involving 52 adults (26 couples) living in a community for over a year, we find that social behavior measured via face-to-face interaction, call, and SMS logs, can be used to predict the spending behavior for couples in terms of their propensity to explore diverse businesses, become loyal customers, and overspend. Our results show that mobile phone based social interaction patterns can provide more predictive power on spending behavior than often-used personality based features. Obtaining novel insights on spending behavior using social-computing frameworks can be of vital importance to economists, marketing professionals, and policy makers.
人类消费行为本质上是社会性的。这项工作激发并奠定了使用基于手机的社交互动功能来分类消费行为的基础。通过对居住在一个社区超过一年的52名成年人(26对夫妇)的数据集,我们发现通过面对面互动、电话和短信日志测量的社会行为可以用来预测夫妇的消费行为,包括他们探索不同业务的倾向、成为忠实客户和超支。我们的研究结果表明,基于手机的社交互动模式比经常使用的基于个性的特征更能预测消费行为。利用社会计算框架获得关于消费行为的新见解对经济学家、市场营销专业人士和政策制定者来说至关重要。
{"title":"Predicting Spending Behavior Using Socio-mobile Features","authors":"V. Singh, Laura Freeman, B. Lepri, A. Pentland","doi":"10.1109/SocialCom.2013.33","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.33","url":null,"abstract":"Human spending behavior is essentially social. This work motivates and grounds the use of mobile phone based social interaction features for classifying spending behavior. Using a data set involving 52 adults (26 couples) living in a community for over a year, we find that social behavior measured via face-to-face interaction, call, and SMS logs, can be used to predict the spending behavior for couples in terms of their propensity to explore diverse businesses, become loyal customers, and overspend. Our results show that mobile phone based social interaction patterns can provide more predictive power on spending behavior than often-used personality based features. Obtaining novel insights on spending behavior using social-computing frameworks can be of vital importance to economists, marketing professionals, and policy makers.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126559967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Parallel Overlapping Community Detection with SLPA 基于SLPA的平行重叠社区检测
Pub Date : 2013-09-08 DOI: 10.1109/SOCIALCOM.2013.37
Konstantin Kuzmin, S. Y. Shah, B. Szymanski
Social networks consist of various communities that host members sharing common characteristics. Often some members of one community are also members of other communities. Such shared membership of different communities leads to overlapping communities. Detecting such overlapping communities is a challenging and computationally intensive problem. In this paper, we investigate the usability of high performance computing in the area of social networks and community detection. We present highly scalable variants of a community detection algorithm called Speaker-listener Label Propagation Algorithm (SLPA). We show that despite of irregular data dependencies in the computation, parallel computing paradigms can significantly speed up the detection of overlapping communities of social networks which is computationally expensive. We show by experiments, how various parallel computing architectures can be utilized to analyze large social network data on both shared memory machines and distributed memory machines, such as IBM Blue Gene.
社交网络由各种各样的社区组成,这些社区的成员拥有共同的特征。通常一个社区的一些成员也是其他社区的成员。不同社区的这种共享成员导致了重叠的社区。检测这样的重叠社区是一个具有挑战性和计算密集型的问题。在本文中,我们研究了高性能计算在社交网络和社区检测领域的可用性。我们提出了一个社区检测算法的高度可扩展的变体,称为扬声器-侦听器标签传播算法(SLPA)。我们表明,尽管在计算中存在不规则的数据依赖关系,但并行计算范式可以显着加快对计算昂贵的社交网络重叠社区的检测。我们通过实验展示了如何利用各种并行计算架构来分析共享内存机器和分布式内存机器(如IBM Blue Gene)上的大型社交网络数据。
{"title":"Parallel Overlapping Community Detection with SLPA","authors":"Konstantin Kuzmin, S. Y. Shah, B. Szymanski","doi":"10.1109/SOCIALCOM.2013.37","DOIUrl":"https://doi.org/10.1109/SOCIALCOM.2013.37","url":null,"abstract":"Social networks consist of various communities that host members sharing common characteristics. Often some members of one community are also members of other communities. Such shared membership of different communities leads to overlapping communities. Detecting such overlapping communities is a challenging and computationally intensive problem. In this paper, we investigate the usability of high performance computing in the area of social networks and community detection. We present highly scalable variants of a community detection algorithm called Speaker-listener Label Propagation Algorithm (SLPA). We show that despite of irregular data dependencies in the computation, parallel computing paradigms can significantly speed up the detection of overlapping communities of social networks which is computationally expensive. We show by experiments, how various parallel computing architectures can be utilized to analyze large social network data on both shared memory machines and distributed memory machines, such as IBM Blue Gene.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126020526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
The Impact of Anonymity in Online Communities 匿名在网络社区中的影响
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.80
Eli Omernick, S. Sood
The scale of participation on social news sites has challenged community managers, leaving them unable to detect and remove all inappropriate content by hand. Automated insult and profanity detection systems have helped, but have failed to address the problem of why this content is contributed in the first place. That is, what implications do interface design choices have on the content being generated? One such design choice is whether or not a site allows anonymous comments. What impact does allowing anonymity have on the quality or quantity of participation on a site? This case study analyses the impact of anonymity on a technology social news site, TechCrunch.com. TechCrunch is ideal for this study in that it underwent a shift from allowing anonymous comments (using the Disqus commenting platform) to disallowing them (using the Facebook commenting platform) in March of 2011. We compare the quality of anonymous and real identity comments through measures of reading level, relevance to the target article, negativity and presence of swear words and anger words. We couple this qualitative analysis with a quantitative analysis of the change in participation to give a complete picture of the impact of anonymity in this online community, with the end goal of informing design on similar social news sites.
社会新闻网站的参与规模给社区管理者带来了挑战,使他们无法手工检测和删除所有不适当的内容。自动侮辱和亵渎检测系统有所帮助,但未能解决为什么这些内容首先被贡献的问题。也就是说,界面设计选择对生成的内容有什么影响?一个这样的设计选择是一个网站是否允许匿名评论。允许匿名对网站参与的质量和数量有什么影响?本案例分析了匿名对科技社会新闻网站TechCrunch.com的影响。TechCrunch是这项研究的理想选择,因为它在2011年3月经历了从允许匿名评论(使用Disqus评论平台)到禁止匿名评论(使用Facebook评论平台)的转变。我们通过阅读水平、与目标文章的相关性、消极性以及脏话和愤怒词的存在来比较匿名和真实身份评论的质量。我们将这种定性分析与参与变化的定量分析结合起来,给出匿名在这个在线社区中的影响的完整图景,最终目标是为类似的社会新闻网站的设计提供信息。
{"title":"The Impact of Anonymity in Online Communities","authors":"Eli Omernick, S. Sood","doi":"10.1109/SocialCom.2013.80","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.80","url":null,"abstract":"The scale of participation on social news sites has challenged community managers, leaving them unable to detect and remove all inappropriate content by hand. Automated insult and profanity detection systems have helped, but have failed to address the problem of why this content is contributed in the first place. That is, what implications do interface design choices have on the content being generated? One such design choice is whether or not a site allows anonymous comments. What impact does allowing anonymity have on the quality or quantity of participation on a site? This case study analyses the impact of anonymity on a technology social news site, TechCrunch.com. TechCrunch is ideal for this study in that it underwent a shift from allowing anonymous comments (using the Disqus commenting platform) to disallowing them (using the Facebook commenting platform) in March of 2011. We compare the quality of anonymous and real identity comments through measures of reading level, relevance to the target article, negativity and presence of swear words and anger words. We couple this qualitative analysis with a quantitative analysis of the change in participation to give a complete picture of the impact of anonymity in this online community, with the end goal of informing design on similar social news sites.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"PC-28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126678201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
SMAC: Subgraph Matching and Centrality in Huge Social Networks 大型社交网络中的子图匹配和中心性
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.27
Noseong Park, Michael Ovelgönne, V. S. Subrahmanian
Classical centrality measures like betweenness, closeness, eigenvector, and degree centrality are application and user independent. They are also independent of graph semantics. However, in many applications, users have a clear idea of who they consider important in graphs where vertices and edges have properties, and the goal of this paper is to enable them to bring their knowledge to the table in defining centrality in graphs. We propose a novel combination of sub graph matching queries which have been studied extensively in the context of both RDF and social networks, and scoring functions. The resulting SMAC framework allows a user to define what he thinks are central vertices in a network via user-defined sub graph patterns and certain mathematical measures he specifies. We formally define SMAC queries and develop algorithms to compute answers to such queries. We test our algorithms on real-world data sets from CiteSeerX, Flickr, YouTube, and IMDb containing over 6M vertices and 15M edges and show that our algorithms work well in practice.
经典的中心性度量,如中间度、接近度、特征向量和度中心性是与应用程序和用户无关的。它们也独立于图语义。然而,在许多应用程序中,用户清楚地知道在顶点和边具有属性的图中他们认为谁是重要的,本文的目标是使他们能够在定义图中的中心性时将他们的知识带到表中。我们提出了一种新的子图匹配查询组合,该组合在RDF和社交网络以及评分函数的背景下得到了广泛的研究。由此产生的SMAC框架允许用户通过用户定义的子图模式和他指定的某些数学度量来定义他认为的网络中的中心顶点。我们正式定义了SMAC查询,并开发了算法来计算这些查询的答案。我们在CiteSeerX、Flickr、YouTube和IMDb的真实数据集上测试了我们的算法,这些数据集包含超过6M个顶点和15M条边,并表明我们的算法在实践中运行良好。
{"title":"SMAC: Subgraph Matching and Centrality in Huge Social Networks","authors":"Noseong Park, Michael Ovelgönne, V. S. Subrahmanian","doi":"10.1109/SocialCom.2013.27","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.27","url":null,"abstract":"Classical centrality measures like betweenness, closeness, eigenvector, and degree centrality are application and user independent. They are also independent of graph semantics. However, in many applications, users have a clear idea of who they consider important in graphs where vertices and edges have properties, and the goal of this paper is to enable them to bring their knowledge to the table in defining centrality in graphs. We propose a novel combination of sub graph matching queries which have been studied extensively in the context of both RDF and social networks, and scoring functions. The resulting SMAC framework allows a user to define what he thinks are central vertices in a network via user-defined sub graph patterns and certain mathematical measures he specifies. We formally define SMAC queries and develop algorithms to compute answers to such queries. We test our algorithms on real-world data sets from CiteSeerX, Flickr, YouTube, and IMDb containing over 6M vertices and 15M edges and show that our algorithms work well in practice.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116574867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Conceptual Quantification of the Dynamicity of Longitudinal Social Networks 纵向社会网络动态的概念量化
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.131
M. S. Uddin, Piraveenan Mahendra, Arif Khan, Babak Amiri
A longitudinal social network evolves over time through the creation and/or deletion of links among a set of actors (e.g. individuals or organisations). Longitudinal social networks are studied by network science and social science researchers to understand network evolution, trend propagation, friendship and belief formation, diffusion of innovations, the spread of deviant behaviour and more. In the current literature, there are different approaches and methods (e.g. Sampson's approach and the Markov model) to study the dynamics of longitudinal social networks. These approaches and methods have mainly been utilised to explore evolutionary changes of longitudinal social networks from one state to another and to explain the underlying reasons for these changes. However, they cannot quantify the level of dynamicity of the over time network changes and the contribution of individual network members (i.e. actors) to these changes. In this study, we first develop a set of measures to quantify different aspects of the dynamicity of a longitudinal social network. We then apply these measures, in order to conduct empirical investigations, to two different longitudinal social networks. Finally, we discuss the implications of the application of these measures and possible future research directions of this study.
纵向社会网络通过一组参与者(例如个人或组织)之间的链接的创建和/或删除而随着时间的推移而发展。网络科学和社会科学研究者对纵向社会网络进行了研究,以了解网络演化、趋势传播、友谊和信仰形成、创新扩散、越轨行为传播等。在目前的文献中,有不同的方法和方法(如Sampson方法和Markov模型)来研究纵向社会网络的动态。这些途径和方法主要用于探索纵向社会网络从一种状态到另一种状态的进化变化,并解释这些变化的潜在原因。然而,他们无法量化随时间网络变化的动态水平以及个体网络成员(即行动者)对这些变化的贡献。在这项研究中,我们首先制定了一套措施来量化纵向社会网络动态的不同方面。然后,为了进行实证调查,我们将这些措施应用于两个不同的纵向社会网络。最后,我们讨论了这些措施的应用意义以及本研究可能的未来研究方向。
{"title":"Conceptual Quantification of the Dynamicity of Longitudinal Social Networks","authors":"M. S. Uddin, Piraveenan Mahendra, Arif Khan, Babak Amiri","doi":"10.1109/SocialCom.2013.131","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.131","url":null,"abstract":"A longitudinal social network evolves over time through the creation and/or deletion of links among a set of actors (e.g. individuals or organisations). Longitudinal social networks are studied by network science and social science researchers to understand network evolution, trend propagation, friendship and belief formation, diffusion of innovations, the spread of deviant behaviour and more. In the current literature, there are different approaches and methods (e.g. Sampson's approach and the Markov model) to study the dynamics of longitudinal social networks. These approaches and methods have mainly been utilised to explore evolutionary changes of longitudinal social networks from one state to another and to explain the underlying reasons for these changes. However, they cannot quantify the level of dynamicity of the over time network changes and the contribution of individual network members (i.e. actors) to these changes. In this study, we first develop a set of measures to quantify different aspects of the dynamicity of a longitudinal social network. We then apply these measures, in order to conduct empirical investigations, to two different longitudinal social networks. Finally, we discuss the implications of the application of these measures and possible future research directions of this study.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125262680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
imGraph: A Distributed In-Memory Graph Database imGraph:一个分布式内存图数据库
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.109
Salim Jouili, Aldemar Reynaga
Diverse applications including cyber security, social networks, protein networks, recommendation systems or citation networks work with inherently graph-structured data. The graphs modeling the data of these applications are large by nature so the efficient processing of them becomes challenging. In this paper we present imGraph, a graph system that addresses the challenge of efficient processing of large graphs by using a distributed in-memory storage. We use this type of storage to obtain fast random data access which is mostly required for graph exploration. imGraph uses a native graph data model to ease the implementation of graph algorithms. On top of it, we design and implement a traversal engine that achieves high performance by efficient memory access, distribution of the work load, and optimizations on network communications. We run a set of experiments on real graph datasets of different sizes to asses the performance of imGraph in relation to other graph systems. The results show that imGraph gets better performance on traversals on large graphs than its counterparts.
包括网络安全、社交网络、蛋白质网络、推荐系统或引文网络在内的各种应用都使用固有的图形结构数据。为这些应用程序的数据建模的图形本质上很大,因此对它们的有效处理变得具有挑战性。在本文中,我们提出了imGraph,这是一个图形系统,通过使用分布式内存存储来解决高效处理大型图形的挑战。我们使用这种类型的存储来获得快速的随机数据访问,这是图形探索所需要的。imGraph使用原生图形数据模型来简化图形算法的实现。在此基础上,我们设计并实现了一个遍历引擎,该引擎通过高效的内存访问、工作负载分配和网络通信优化来实现高性能。我们在不同大小的真实图形数据集上运行了一组实验,以评估与其他图形系统相比imGraph的性能。结果表明,与同类算法相比,imGraph在大图上的遍历性能更好。
{"title":"imGraph: A Distributed In-Memory Graph Database","authors":"Salim Jouili, Aldemar Reynaga","doi":"10.1109/SocialCom.2013.109","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.109","url":null,"abstract":"Diverse applications including cyber security, social networks, protein networks, recommendation systems or citation networks work with inherently graph-structured data. The graphs modeling the data of these applications are large by nature so the efficient processing of them becomes challenging. In this paper we present imGraph, a graph system that addresses the challenge of efficient processing of large graphs by using a distributed in-memory storage. We use this type of storage to obtain fast random data access which is mostly required for graph exploration. imGraph uses a native graph data model to ease the implementation of graph algorithms. On top of it, we design and implement a traversal engine that achieves high performance by efficient memory access, distribution of the work load, and optimizations on network communications. We run a set of experiments on real graph datasets of different sizes to asses the performance of imGraph in relation to other graph systems. The results show that imGraph gets better performance on traversals on large graphs than its counterparts.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122488878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Event Driven Monitoring of Composite Services 组合服务的事件驱动监视
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.83
M. Asim, D. Llewellyn-Jones, Brett Lempereur, Bo Zhou, Q. Shi, M. Merabti
The Future Internet will be populated by not just data and devices, but also services. Service-Oriented Architecture (SOA) approaches are allowing new ways for users and developers to manage, control and benefit from the services that are being made available. However, SOA-based applications are highly dynamic and liable to change significantly at runtime. This justifies the need for monitoring composed services throughout the lifetime of service execution. In this paper we present a novel framework for monitoring services at runtime and ensuring that services behave as they have promised. The framework enables monitoring of both atomic and composite services and offers high flexibility through the use of Complex Event Processing (CEP). Services are defined as Business Process Modeling Notation (BPMN) processes which can then be monitored during execution. The use of CEP and monitoring points that are inserted automatically between services allows the method to be more flexible and accurate than existing techniques.
未来的互联网将不仅由数据和设备组成,还将由服务组成。面向服务的体系结构(SOA)方法为用户和开发人员提供了管理、控制可用服务并从中受益的新方法。然而,基于soa的应用程序是高度动态的,在运行时可能会发生重大变化。这证明了在服务执行的整个生命周期中监视组合服务的必要性。在本文中,我们提出了一个新的框架,用于在运行时监视服务并确保服务按照承诺的方式运行。该框架支持监视原子服务和组合服务,并通过使用复杂事件处理(Complex Event Processing, CEP)提供高度的灵活性。服务被定义为业务流程建模符号(BPMN)流程,然后可以在执行过程中对其进行监控。使用在服务之间自动插入的CEP和监测点,使该方法比现有技术更加灵活和准确。
{"title":"Event Driven Monitoring of Composite Services","authors":"M. Asim, D. Llewellyn-Jones, Brett Lempereur, Bo Zhou, Q. Shi, M. Merabti","doi":"10.1109/SocialCom.2013.83","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.83","url":null,"abstract":"The Future Internet will be populated by not just data and devices, but also services. Service-Oriented Architecture (SOA) approaches are allowing new ways for users and developers to manage, control and benefit from the services that are being made available. However, SOA-based applications are highly dynamic and liable to change significantly at runtime. This justifies the need for monitoring composed services throughout the lifetime of service execution. In this paper we present a novel framework for monitoring services at runtime and ensuring that services behave as they have promised. The framework enables monitoring of both atomic and composite services and offers high flexibility through the use of Complex Event Processing (CEP). Services are defined as Business Process Modeling Notation (BPMN) processes which can then be monitored during execution. The use of CEP and monitoring points that are inserted automatically between services allows the method to be more flexible and accurate than existing techniques.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131613052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2013 International Conference on Social Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1