首页 > 最新文献

2013 International Conference on Social Computing最新文献

英文 中文
Popularity Prediction of Social Multimedia Based on Concept Drift 基于概念漂移的社交多媒体流行度预测
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.123
Shih-Hong Jheng, Cheng-te Li, Hsi-Lin Chen, M. Shan
Microblogging services such as Twitter and Plurk allow users to easily access and share different types of social multimedia (e.g. images and videos) over the online social world. However, information overload happens to users and prohibits them from reaching popular and important digital contents. This paper studies the problem of predicting the popularity of social multimedia which is embedded in short messages of microblogging social networks. Social multimedia exhibits the property that they might be persistently or periodically re-shared and thus their popularity might resurrect at some time and evolve over time. We exploit the idea of concept drift to capture this property. We formulate the problem using classification, and propose to tackle the tasks of Re-share classification and Popularity Score classification. Two categories of features are devised and extracted, including information diffusion and explicit multimedia meta information. We develop a concept drift-based popularity predictor, by ensembling multiple trained classifiers from social multimedia instances in different time intervals. The key lies in dynamically determining the ensemble weights of classifiers. Experiments conducted on the Plurk data show the high accuracy on the popularity classification and the promising results on detecting popular social multimedia.
像Twitter和Plurk这样的微博服务允许用户在网络社交世界中轻松访问和分享不同类型的社交多媒体(例如图像和视频)。然而,信息超载发生在用户身上,阻止他们接触流行和重要的数字内容。本文研究了微博社交网络短消息中嵌入的社交多媒体的流行度预测问题。社交多媒体显示出一种属性,即它们可能会被持久地或周期性地重新共享,因此它们的受欢迎程度可能会在某个时候复活,并随着时间的推移而发展。我们利用概念漂移的概念来捕捉这一特性。我们用分类的方法来表述这个问题,并提出了解决再分享分类和人气评分分类的任务。设计并提取了信息扩散和显式多媒体元信息两类特征。我们开发了一个基于概念漂移的流行预测器,通过集成来自不同时间间隔的社交多媒体实例的多个训练分类器。关键在于动态确定分类器的集合权值。在Plurk数据上进行的实验表明,该算法在人气分类上具有较高的准确率,在流行社交媒体的检测上取得了良好的效果。
{"title":"Popularity Prediction of Social Multimedia Based on Concept Drift","authors":"Shih-Hong Jheng, Cheng-te Li, Hsi-Lin Chen, M. Shan","doi":"10.1109/SocialCom.2013.123","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.123","url":null,"abstract":"Microblogging services such as Twitter and Plurk allow users to easily access and share different types of social multimedia (e.g. images and videos) over the online social world. However, information overload happens to users and prohibits them from reaching popular and important digital contents. This paper studies the problem of predicting the popularity of social multimedia which is embedded in short messages of microblogging social networks. Social multimedia exhibits the property that they might be persistently or periodically re-shared and thus their popularity might resurrect at some time and evolve over time. We exploit the idea of concept drift to capture this property. We formulate the problem using classification, and propose to tackle the tasks of Re-share classification and Popularity Score classification. Two categories of features are devised and extracted, including information diffusion and explicit multimedia meta information. We develop a concept drift-based popularity predictor, by ensembling multiple trained classifiers from social multimedia instances in different time intervals. The key lies in dynamically determining the ensemble weights of classifiers. Experiments conducted on the Plurk data show the high accuracy on the popularity classification and the promising results on detecting popular social multimedia.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116109333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effect of Vaccination Strategies on the Herd Immunity of Growing Networks 疫苗接种策略对生长网络群体免疫的影响
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.47
Piraveenan Mahendra, M. S. Uddin, Gnana Thedchanamoorthy
It is well known that non-vaccinated individuals may be protected from contacting a disease by vaccinated individuals in a social network through community protection (herd immunity). Such protection greatly depends on the underlying topology of the social network, and the strategy used in selecting individuals for vaccination. Social networks however undergo constant growth, and it may be argued that network growth may change the level of herd immunity present in social networks. In this paper, we analyse the effect of growth and immunization strategies on herd immunity of social networks. Considering three classical topologies - Random, scale-free and small-world, we compare the influence of immunization strategies on each of them and then discuss how network growth can nullify or amplify these differences. We show that betweenness based vaccination is best strategy of immunization, regardless of topology, in static networks, but its prominence over other strategies diminishes in dynamically growing topologies. We demonstrate that herd immunity of random networks actually increases with growth, if the proportion of survivors to a secondary infection is considered, while the community protection in scale-free and small world networks decreases with growth. We compare the relative influence of growth on each class of networks vaccinated under different strategies.
众所周知,通过社区保护(群体免疫),社会网络中接种疫苗的个人可以保护未接种疫苗的个人不接触某种疾病。这种保护很大程度上取决于社会网络的底层拓扑结构,以及选择接种疫苗的个体所采用的策略。然而,社会网络经历了不断的增长,可能有人认为,网络增长可能会改变社会网络中存在的群体免疫水平。本文分析了生长策略和免疫策略对社会网络群体免疫力的影响。考虑到三种经典拓扑-随机,无标度和小世界,我们比较了免疫策略对它们的影响,然后讨论了网络增长如何抵消或放大这些差异。我们表明,在静态网络中,基于间隔的疫苗接种是最佳的免疫策略,无论拓扑如何,但在动态增长的拓扑中,它比其他策略的突出性减弱。我们证明,如果考虑到二次感染的幸存者比例,随机网络的群体免疫力实际上随着增长而增加,而无标度和小世界网络的社区保护随着增长而降低。我们比较了成长对不同策略下接种疫苗的每一类网络的相对影响。
{"title":"Effect of Vaccination Strategies on the Herd Immunity of Growing Networks","authors":"Piraveenan Mahendra, M. S. Uddin, Gnana Thedchanamoorthy","doi":"10.1109/SocialCom.2013.47","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.47","url":null,"abstract":"It is well known that non-vaccinated individuals may be protected from contacting a disease by vaccinated individuals in a social network through community protection (herd immunity). Such protection greatly depends on the underlying topology of the social network, and the strategy used in selecting individuals for vaccination. Social networks however undergo constant growth, and it may be argued that network growth may change the level of herd immunity present in social networks. In this paper, we analyse the effect of growth and immunization strategies on herd immunity of social networks. Considering three classical topologies - Random, scale-free and small-world, we compare the influence of immunization strategies on each of them and then discuss how network growth can nullify or amplify these differences. We show that betweenness based vaccination is best strategy of immunization, regardless of topology, in static networks, but its prominence over other strategies diminishes in dynamically growing topologies. We demonstrate that herd immunity of random networks actually increases with growth, if the proportion of survivors to a secondary infection is considered, while the community protection in scale-free and small world networks decreases with growth. We compare the relative influence of growth on each class of networks vaccinated under different strategies.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116903532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Obesity Causes, Prevalence and Prevention 探讨肥胖的成因、流行及预防
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.128
Ahmad Albu-Shamah, J. Zhan
Obesity is simply defined as the condition of being significantly overweight. It's the state where an individual weight is greater than and exceeding the healthy weight. Obesity and overweight has become the fastest growing epidemic affecting not only Americans but also the entire population in the world. Now, The question is how to fight Obesity? Surely there are numerous effective, safe and natural ways to fight obesity but why don't we being educated, informed or even alarmed that our body might gain unneeded extra weight? To avoid reaching such a condition, an individual needs to detect early causes to prevent overweight from happening, there are many causes that will lead to gain weight but there are two parameters that are strongly considered vital factors in weight gaining, these two are the amount of food intake and the physical activity. Our study will focus on the previously mentioned factors to help individuals to take immediate response to their current state.
肥胖被简单地定义为明显超重的状态。它是指个体体重大于或超过健康体重的状态。肥胖和超重已经成为增长最快的流行病,不仅影响美国人,而且影响全世界的人口。现在的问题是如何对抗肥胖?当然,有许多有效、安全、自然的方法来对抗肥胖,但为什么我们不被教育、告知甚至警告我们的身体可能会增加不必要的额外体重呢?为了避免达到这种情况,个体需要发现早期原因以防止超重的发生,有许多原因会导致体重增加,但有两个参数被强烈认为是体重增加的重要因素,这两个是食物摄入量和身体活动。我们的研究将集中在前面提到的因素上,以帮助个人对他们当前的状态做出立即的反应。
{"title":"Towards Obesity Causes, Prevalence and Prevention","authors":"Ahmad Albu-Shamah, J. Zhan","doi":"10.1109/SocialCom.2013.128","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.128","url":null,"abstract":"Obesity is simply defined as the condition of being significantly overweight. It's the state where an individual weight is greater than and exceeding the healthy weight. Obesity and overweight has become the fastest growing epidemic affecting not only Americans but also the entire population in the world. Now, The question is how to fight Obesity? Surely there are numerous effective, safe and natural ways to fight obesity but why don't we being educated, informed or even alarmed that our body might gain unneeded extra weight? To avoid reaching such a condition, an individual needs to detect early causes to prevent overweight from happening, there are many causes that will lead to gain weight but there are two parameters that are strongly considered vital factors in weight gaining, these two are the amount of food intake and the physical activity. Our study will focus on the previously mentioned factors to help individuals to take immediate response to their current state.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115221977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards a Framework for Privacy-Aware Mobile Crowdsourcing 面向隐私意识的移动众包框架
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.71
Yang Wang, Yun Huang, Claudia Louis
The practice of employing "the crowd" to help solve an organization's problems first became popular in the business sector, and has since spread to public and not-for-profit organizations. Input from the crowd can be solicited using different mechanisms involving various types of web-based applications, or the more recent trend of employing mobile phones with sensing capabilities. However, these crowd sourcing systems may lead to various privacy and security risks which can then hinder the adoption of these services. How to identify and address these potential risks in such systems has both research and practical value. This paper presents two aspects of our work in this emerging space. First, we describe a survey of potential privacy and security risks in mobile crowd sourcing systems (MCSS). Second, we describe our PEALS framework to support privacy-aware mobile crowd sourcing.
利用“群众”帮助解决组织问题的做法首先在商业领域流行起来,后来扩展到公共和非营利组织。可以使用不同的机制,包括各种基于网络的应用程序,或使用具有传感功能的移动电话的最新趋势,从人群中征求意见。然而,这些众包系统可能会导致各种隐私和安全风险,从而阻碍这些服务的采用。如何识别和解决这些系统中的潜在风险具有研究和实用价值。本文介绍了我们在这个新兴领域的两个方面的工作。首先,我们描述了移动众包系统(MCSS)中潜在的隐私和安全风险的调查。其次,我们描述了我们的PEALS框架,以支持具有隐私意识的移动众包。
{"title":"Towards a Framework for Privacy-Aware Mobile Crowdsourcing","authors":"Yang Wang, Yun Huang, Claudia Louis","doi":"10.1109/SocialCom.2013.71","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.71","url":null,"abstract":"The practice of employing \"the crowd\" to help solve an organization's problems first became popular in the business sector, and has since spread to public and not-for-profit organizations. Input from the crowd can be solicited using different mechanisms involving various types of web-based applications, or the more recent trend of employing mobile phones with sensing capabilities. However, these crowd sourcing systems may lead to various privacy and security risks which can then hinder the adoption of these services. How to identify and address these potential risks in such systems has both research and practical value. This paper presents two aspects of our work in this emerging space. First, we describe a survey of potential privacy and security risks in mobile crowd sourcing systems (MCSS). Second, we describe our PEALS framework to support privacy-aware mobile crowd sourcing.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123731198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds 密钥恢复使用噪声秘密共享与折扣在大云
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.105
S. Jajodia, W. Litwin, T. Schwarz
Encryption key loss problem is the Achilles's heel of cryptography. Key escrow helps, but favors disclosures. Schemes for recoverable encryption keys through noised secret sharing alleviate the dilemma. Key owner escrows a specifically encrypted backup. The recovery needs a large cloud. Cloud cost, money trail should rarefy illegal attempts. We now propose noised secret sharing schemes supporting discounts. The recovery request with discount code lowers the recovery complexity, easily by orders of magnitude. A smaller cloud may suffice for the same recovery timing. Alternatively, same cloud may provide faster recovery etc. Our schemes appear useful for users attracted to Big Data, but afraid of possibly humongous consequences of the key loss or data disclosure.
加密密钥丢失问题是密码学的致命弱点。密钥托管有帮助,但更倾向于信息披露。通过噪声秘密共享的可恢复加密密钥方案缓解了这一困境。密钥所有者托管一个特别加密的备份。恢复需要一个大的云。云成本,资金追踪应该会减少非法企图。我们现在提出了支持折扣的秘密共享方案。带有折扣代码的恢复请求降低了恢复的复杂性,很容易按数量级进行恢复。较小的云可能满足相同的恢复时间。或者,相同的云可能提供更快的恢复等。我们的方案似乎对被大数据吸引的用户有用,但担心密钥丢失或数据泄露可能带来的巨大后果。
{"title":"Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds","authors":"S. Jajodia, W. Litwin, T. Schwarz","doi":"10.1109/SocialCom.2013.105","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.105","url":null,"abstract":"Encryption key loss problem is the Achilles's heel of cryptography. Key escrow helps, but favors disclosures. Schemes for recoverable encryption keys through noised secret sharing alleviate the dilemma. Key owner escrows a specifically encrypted backup. The recovery needs a large cloud. Cloud cost, money trail should rarefy illegal attempts. We now propose noised secret sharing schemes supporting discounts. The recovery request with discount code lowers the recovery complexity, easily by orders of magnitude. A smaller cloud may suffice for the same recovery timing. Alternatively, same cloud may provide faster recovery etc. Our schemes appear useful for users attracted to Big Data, but afraid of possibly humongous consequences of the key loss or data disclosure.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121551290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Risk Management in the Era of BYOD: The Quintet of Technology Adoption, Controls, Liabilities, User Perception, and User Behavior BYOD时代的风险管理:技术采用、控制、责任、用户感知和用户行为的五要素
Pub Date : 2013-09-08 DOI: 10.1109/SOCIALCOM.2013.64
T. Yang, Radu E. Vlas, A. Yang, Cristina Vlas
An increasing number of companies and organizations have allowed employees (as well as business partners and contractors) to use their own devices to connect to company assets, resulting in the phenomena of BYOD (Bring Your Own Devices). Employees' own devices may pose greater threats against the corporation than its own assets would. They are perceived as more vulnerable and easier to become compromised than devices issued and controlled by the company. In this context, the need to manage the BYOD practice is undeniable. In this paper we propose the Risk Management Quintet as a model of understanding the BYOD practice. The relationships among the components of the Quintet, i.e., technology adoption, control, liabilities, user perception, and user behavior, are examined in the context of control mechanisms.
越来越多的公司和组织允许员工(以及业务合作伙伴和承包商)使用自己的设备连接到公司资产,导致BYOD(自带设备)现象。员工自己的设备可能比公司自己的资产对公司构成更大的威胁。它们被认为比该公司发行和控制的设备更容易受到攻击,也更容易受到损害。在这种背景下,管理BYOD实践的必要性是不可否认的。在本文中,我们提出风险管理五重奏作为理解BYOD实践的模型。五要素之间的关系,即技术采用、控制、责任、用户感知和用户行为,在控制机制的背景下进行了检查。
{"title":"Risk Management in the Era of BYOD: The Quintet of Technology Adoption, Controls, Liabilities, User Perception, and User Behavior","authors":"T. Yang, Radu E. Vlas, A. Yang, Cristina Vlas","doi":"10.1109/SOCIALCOM.2013.64","DOIUrl":"https://doi.org/10.1109/SOCIALCOM.2013.64","url":null,"abstract":"An increasing number of companies and organizations have allowed employees (as well as business partners and contractors) to use their own devices to connect to company assets, resulting in the phenomena of BYOD (Bring Your Own Devices). Employees' own devices may pose greater threats against the corporation than its own assets would. They are perceived as more vulnerable and easier to become compromised than devices issued and controlled by the company. In this context, the need to manage the BYOD practice is undeniable. In this paper we propose the Risk Management Quintet as a model of understanding the BYOD practice. The relationships among the components of the Quintet, i.e., technology adoption, control, liabilities, user perception, and user behavior, are examined in the context of control mechanisms.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121999679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Finding Number of Clusters in a Gene Co-expression Network Using Independent Sets 利用独立集寻找基因共表达网络中的簇数
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.125
Harun Pirim
Determining the number of clusters is required for most of the clustering algorithms. The number of clusters in a gene co-expression network is not known a prior. In this study, maximum independent set concept from graph theory is applied for a gene expression data set. The results indicate that employing independent set approach to approximate the number of clusters is promising.
大多数聚类算法都需要确定聚类的数量。基因共表达网络中的簇数是未知的。本文将图论中的最大独立集概念应用于基因表达数据集。结果表明,采用独立集方法来近似聚类数量是有希望的。
{"title":"Finding Number of Clusters in a Gene Co-expression Network Using Independent Sets","authors":"Harun Pirim","doi":"10.1109/SocialCom.2013.125","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.125","url":null,"abstract":"Determining the number of clusters is required for most of the clustering algorithms. The number of clusters in a gene co-expression network is not known a prior. In this study, maximum independent set concept from graph theory is applied for a gene expression data set. The results indicate that employing independent set approach to approximate the number of clusters is promising.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126332913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparing Tag Clustering Algorithms for Mining Twitter Users' Interests 比较标签聚类算法挖掘Twitter用户兴趣
Pub Date : 2013-09-08 DOI: 10.1109/SOCIALCOM.2013.102
S. S. Rodríguez, Ana Fernández Vilas, R. Redondo, J. Pazos-Arias
This paper addresses the problem of mining users' interest from the vast, noise, unstructured and dynamic data generated on social media sites, taking Twitter as case study. The mining process uses different Natural Language Processing techniques to extract the relevant words from subscribers' tweets and applies cluster analysis over them. We evaluate the performance of three different tag clustering algorithms -PAM, Affinity Propagation and UPGMA- when considering the hyperlink structure of Wikipedia as external source for semantic closeness among words. We provide a solution which can be developed without any a-priori knowledge about the number and category of topics, neither a priori knowledge about the users we are applying the extraction for. This solution is based on using an unsupervised measure of the clustering quality (Silhouette width) to estimate the parameters of the cluster analysis. Finally, as human feedback is not as reliable as expected, we validate the approach by using Twitter hash tags - the implicit classifying method used by Twitter users to organise their tweets.
本文以Twitter为例,从社交媒体网站产生的大量、噪音、非结构化和动态数据中挖掘用户兴趣。挖掘过程使用不同的自然语言处理技术从订阅者的推文中提取相关单词,并对其进行聚类分析。我们评估了三种不同的标签聚类算法——pam、Affinity Propagation和UPGMA——在考虑Wikipedia的超链接结构作为单词之间语义紧密度的外部来源时的性能。我们提供了一个解决方案,它可以在没有任何关于主题数量和类别的先验知识的情况下开发,也不需要关于我们正在应用提取的用户的先验知识。该解决方案基于使用无监督的聚类质量度量(剪影宽度)来估计聚类分析的参数。最后,由于人类反馈不像预期的那样可靠,我们通过使用Twitter哈希标签(Twitter用户用来组织其推文的隐式分类方法)来验证该方法。
{"title":"Comparing Tag Clustering Algorithms for Mining Twitter Users' Interests","authors":"S. S. Rodríguez, Ana Fernández Vilas, R. Redondo, J. Pazos-Arias","doi":"10.1109/SOCIALCOM.2013.102","DOIUrl":"https://doi.org/10.1109/SOCIALCOM.2013.102","url":null,"abstract":"This paper addresses the problem of mining users' interest from the vast, noise, unstructured and dynamic data generated on social media sites, taking Twitter as case study. The mining process uses different Natural Language Processing techniques to extract the relevant words from subscribers' tweets and applies cluster analysis over them. We evaluate the performance of three different tag clustering algorithms -PAM, Affinity Propagation and UPGMA- when considering the hyperlink structure of Wikipedia as external source for semantic closeness among words. We provide a solution which can be developed without any a-priori knowledge about the number and category of topics, neither a priori knowledge about the users we are applying the extraction for. This solution is based on using an unsupervised measure of the clustering quality (Silhouette width) to estimate the parameters of the cluster analysis. Finally, as human feedback is not as reliable as expected, we validate the approach by using Twitter hash tags - the implicit classifying method used by Twitter users to organise their tweets.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124715786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards an Attribute Based Constraints Specification Language 一种基于属性的约束规范语言
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.23
K. Bijon, R. Krishnan, R. Sandhu
Recently, attribute based access control (ABAC) has received considerable attention from the security community for its policy flexibility and dynamic decision making capabilities. In ABAC, authorization decisions are based on various attributes of entities involved in the access (e.g., users, subjects, objects, context, etc.). In an ABAC system, correct attribute assignment to different entities is necessary for ensuring appropriate access. Although considerable research has been conducted on ABAC, so far constraints specification on attribute assignment to entities has not been systematically studied in the literature. In this paper, we propose an attribute-based constraints specification language(ABCL) for expressing a variety of constraints on values that different attributes of various entities in the system can take. ABCL can be used to specify constraints on a single attribute or across multiple attributes of a particular entity. Furthermore, constraints on attributes assignment across multiple entities (e.g., attributes of different users) can also be specified. Finally, we demonstrate the usefulness of ABCL in practical usage scenarios including banking domains.
近年来,基于属性的访问控制(ABAC)以其策略灵活性和动态决策能力受到了安全界的广泛关注。在ABAC中,授权决策基于访问中涉及的实体的各种属性(例如,用户、主题、对象、上下文等)。在ABAC系统中,对不同实体进行正确的属性分配是保证正确访问的必要条件。虽然对ABAC进行了大量的研究,但目前文献中还没有对实体属性赋值的约束规范进行系统的研究。在本文中,我们提出了一种基于属性的约束规范语言(ABCL),用于表达系统中不同实体的不同属性可以取的值的各种约束。ABCL可用于指定对特定实体的单个属性或跨多个属性的约束。此外,还可以指定跨多个实体的属性分配约束(例如,不同用户的属性)。最后,我们展示了ABCL在包括银行领域在内的实际使用场景中的有用性。
{"title":"Towards an Attribute Based Constraints Specification Language","authors":"K. Bijon, R. Krishnan, R. Sandhu","doi":"10.1109/SocialCom.2013.23","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.23","url":null,"abstract":"Recently, attribute based access control (ABAC) has received considerable attention from the security community for its policy flexibility and dynamic decision making capabilities. In ABAC, authorization decisions are based on various attributes of entities involved in the access (e.g., users, subjects, objects, context, etc.). In an ABAC system, correct attribute assignment to different entities is necessary for ensuring appropriate access. Although considerable research has been conducted on ABAC, so far constraints specification on attribute assignment to entities has not been systematically studied in the literature. In this paper, we propose an attribute-based constraints specification language(ABCL) for expressing a variety of constraints on values that different attributes of various entities in the system can take. ABCL can be used to specify constraints on a single attribute or across multiple attributes of a particular entity. Furthermore, constraints on attributes assignment across multiple entities (e.g., attributes of different users) can also be specified. Finally, we demonstrate the usefulness of ABCL in practical usage scenarios including banking domains.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115021730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
A Tweet of the Mind: Automated Emotion Detection for Social Media Using Brain Wave Pattern Analysis 心灵的推特:使用脑电波模式分析的社交媒体自动情感检测
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.158
Abdulaziz Almehmadi, Michael Bourque, K. El-Khatib
While millions of individuals around the globe use social media every second to disseminate, in some form, their emotions and experiences, there are still some situational challenges these individuals face while trying to share experience over social media. This work introduces the idea of using a Brain Computer Interface device to detect human emotion, which is then paired with geo-location information and automatically posted to a popular social media service. A complete architecture of a system that implements this idea is proposed and implemented, where Brain Pattern Analysis is performed using an Electroencephalogram device and a mobile computing device.
虽然全球每秒钟都有数百万人使用社交媒体以某种形式传播他们的情绪和经历,但这些人在试图通过社交媒体分享经验时仍然面临一些情境挑战。这项工作介绍了使用脑机接口设备来检测人类情感的想法,然后将其与地理位置信息配对,并自动发布到流行的社交媒体服务上。提出并实现了一个完整的系统架构,其中使用脑电图设备和移动计算设备执行脑模式分析。
{"title":"A Tweet of the Mind: Automated Emotion Detection for Social Media Using Brain Wave Pattern Analysis","authors":"Abdulaziz Almehmadi, Michael Bourque, K. El-Khatib","doi":"10.1109/SocialCom.2013.158","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.158","url":null,"abstract":"While millions of individuals around the globe use social media every second to disseminate, in some form, their emotions and experiences, there are still some situational challenges these individuals face while trying to share experience over social media. This work introduces the idea of using a Brain Computer Interface device to detect human emotion, which is then paired with geo-location information and automatically posted to a popular social media service. A complete architecture of a system that implements this idea is proposed and implemented, where Brain Pattern Analysis is performed using an Electroencephalogram device and a mobile computing device.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116439038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2013 International Conference on Social Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1