首页 > 最新文献

2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)最新文献

英文 中文
DIFSoN: Discovering influential friends from social networks DIFSoN:从社交网络中发现有影响力的朋友
S. Tanbeer, C. Leung, Juan J. Cameron
Social networks, which are made of social entities (e.g., individual users) linked by some specific types of interdependencies such as friendship, have become popular to facilitate collaboration and knowledge sharing among users. Such interactions or interdependencies can be dependent on or influenced by user characteristics such as connectivity, centrality, weight, importance, and activity in the networks. As such, some users in the social networks can be considered as highly influential to others. In this paper, we propose a computational model that integrates data mining with social computing to help users to discover influential friends from the social networks.
社交网络是由一些特定类型的相互依赖关系(如友谊)连接起来的社会实体(如个人用户)组成的,它已经变得流行,以促进用户之间的协作和知识共享。这种交互或相互依赖可能依赖于或受到用户特征的影响,例如网络中的连通性、中心性、权重、重要性和活动。因此,社交网络中的一些用户可以被认为对其他人具有高度影响力。在本文中,我们提出了一个将数据挖掘与社会计算相结合的计算模型,以帮助用户从社交网络中发现有影响力的朋友。
{"title":"DIFSoN: Discovering influential friends from social networks","authors":"S. Tanbeer, C. Leung, Juan J. Cameron","doi":"10.1109/CASoN.2012.6412389","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412389","url":null,"abstract":"Social networks, which are made of social entities (e.g., individual users) linked by some specific types of interdependencies such as friendship, have become popular to facilitate collaboration and knowledge sharing among users. Such interactions or interdependencies can be dependent on or influenced by user characteristics such as connectivity, centrality, weight, importance, and activity in the networks. As such, some users in the social networks can be considered as highly influential to others. In this paper, we propose a computational model that integrates data mining with social computing to help users to discover influential friends from the social networks.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122795223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Mingle spontaneous social network 融入自发的社交网络
D. Zaupa, C. Costa, Jessica Silva, J. Barbosa, A. Yamin
Social networks provide a new way of communication that still preserves our human social interaction. Due to the widespread use of mobile devices, people tend to use their smartphone or tablet as the main way to make that interaction. Furthermore, applications developed to these devices are fostering the use of contextual information, such as the location of the user. In this way, this article proposes Mingle, a model for a spontaneous social network targeted at mobile devices. In our proposal, the social network is spontaneous, i.e. involves only people that are physically present in a specific location. Besides presenting the model, we show a developed prototype using Android-based devices. We evaluated Mingle employing two strategies, a usage case and a performance evaluation. The results were encouraging and show the potential of deploying Mingle in real situations.
社交网络提供了一种新的交流方式,仍然保留了我们人类的社会互动。由于移动设备的广泛使用,人们倾向于使用智能手机或平板电脑作为进行互动的主要方式。此外,为这些设备开发的应用程序正在促进上下文信息的使用,例如用户的位置。通过这种方式,本文提出了Mingle,一个针对移动设备的自发社交网络模型。在我们的建议中,社交网络是自发的,即只涉及在特定地点实际存在的人。除了展示模型外,我们还展示了一个基于android设备的开发原型。我们使用两种策略来评估Mingle,一个用例和一个性能评估。结果令人鼓舞,并显示了在实际情况下部署Mingle的潜力。
{"title":"Mingle spontaneous social network","authors":"D. Zaupa, C. Costa, Jessica Silva, J. Barbosa, A. Yamin","doi":"10.1109/CASoN.2012.6412394","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412394","url":null,"abstract":"Social networks provide a new way of communication that still preserves our human social interaction. Due to the widespread use of mobile devices, people tend to use their smartphone or tablet as the main way to make that interaction. Furthermore, applications developed to these devices are fostering the use of contextual information, such as the location of the user. In this way, this article proposes Mingle, a model for a spontaneous social network targeted at mobile devices. In our proposal, the social network is spontaneous, i.e. involves only people that are physically present in a specific location. Besides presenting the model, we show a developed prototype using Android-based devices. We evaluated Mingle employing two strategies, a usage case and a performance evaluation. The results were encouraging and show the potential of deploying Mingle in real situations.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123359257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Quality of service & process control: What is their efficiency in available IT products? 服务质量和过程控制:它们在现有IT产品中的效率如何?
M. Janáková
The paper presents and discusses the quality of service and process control in selected information technology (IT) products with links to their efficiency. The advantage is a wider analysis this problem over operating and database systems, Business Intelligence (BI) and Customer Relationship Management (CRM) products with respect to the complexity of the implementation. A good starting point is an analysis of selected products based on Petri Nets with support simulation and further analysis. Th is analysis produces re sults in order to find a way of improving adopted services for web applications. The Jaspersoft Suite (BI) and Sugar CRM products offer minimal information and methods to control processes via a scheduler for reports and meetings. Effective control of processes needs an elaborate solution. An inspirational way is complex solution in the Oracle database system with chains for a better overview about process relations and contexts. Difficult orientation within the Oracle website is compensated by a user-friendly interface that is absent in the OpenSolaris operating system with otherwise comprehensive environment for process control.
本文介绍并讨论了选定的信息技术(IT)产品的服务质量和过程控制及其效率的联系。其优点是,相对于操作系统和数据库系统、商业智能(BI)和客户关系管理(CRM)产品,在实现的复杂性方面可以对该问题进行更广泛的分析。一个很好的起点是基于Petri网对选定产品进行分析,并进行支持仿真和进一步分析。该分析产生的结果是为了找到一种改进web应用程序所采用的服务的方法。Jaspersoft Suite (BI)和Sugar CRM产品提供了最少的信息和方法,通过报告和会议的调度程序来控制过程。过程的有效控制需要精心的解决方案。一个鼓舞人心的方法是在Oracle数据库系统中使用链的复杂解决方案,以便更好地概述进程关系和上下文。OpenSolaris操作系统中缺少的用户友好界面弥补了Oracle网站中难以定位的问题,而OpenSolaris操作系统具有全面的进程控制环境。
{"title":"Quality of service & process control: What is their efficiency in available IT products?","authors":"M. Janáková","doi":"10.1109/CASoN.2012.6412427","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412427","url":null,"abstract":"The paper presents and discusses the quality of service and process control in selected information technology (IT) products with links to their efficiency. The advantage is a wider analysis this problem over operating and database systems, Business Intelligence (BI) and Customer Relationship Management (CRM) products with respect to the complexity of the implementation. A good starting point is an analysis of selected products based on Petri Nets with support simulation and further analysis. Th is analysis produces re sults in order to find a way of improving adopted services for web applications. The Jaspersoft Suite (BI) and Sugar CRM products offer minimal information and methods to control processes via a scheduler for reports and meetings. Effective control of processes needs an elaborate solution. An inspirational way is complex solution in the Oracle database system with chains for a better overview about process relations and contexts. Difficult orientation within the Oracle website is compensated by a user-friendly interface that is absent in the OpenSolaris operating system with otherwise comprehensive environment for process control.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124336344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ontology-based Negotiation of security requirements in cloud 云环境中基于本体的安全需求协商
L. Liccardo, M. Rak, G. Modica, O. Tomarchio
The Cloud Computing paradigm attracts many customers because of the potentialities it promises. Despite of many benefits, a widespread adoption is limited by many issues that potential customers still have to face. Security in the cloud is one of the main concern for the customer. The Cloud Service Provider (CSP) is responsible of providing security to customers and assuring that their data and application are properly secured. In this context, the concept of Service Level Agreement (SLA) assumes a great importance. It can be used as a means to formalize and establish in a contract what must effectively be granted in terms of security levels. There is actually Semantic Gap between how security guarantees are intended respectively by customers and providers. A customer is inclined to express security in terms of high-level requirements, while a CSP expresses guarantees through a technical, low-level language. To address this gap, the key is to find a common language for both the customer and the CSP. The goal of this paper is to offer an Ontology-based Negotiation Service allowing a customer to negotiate the interested security level among different CSPs, with the possibility to choose the best security offering; a Security Ontology was developed as a basis for a common semantic language that customers and providers will have to use to express security features and requirements.
云计算范式吸引了许多客户,因为它所承诺的潜力。尽管有很多好处,但广泛采用仍然受到潜在客户必须面对的许多问题的限制。云中的安全性是客户主要关心的问题之一。云服务提供商(CSP)负责为客户提供安全性,并确保他们的数据和应用程序得到适当的保护。在这种情况下,服务水平协议(SLA)的概念非常重要。它可以作为一种手段,在合同中形式化和建立必须在安全级别方面有效授予的内容。实际上,客户和提供商对安全保证的预期存在语义上的差距。客户倾向于用高级需求来表达安全性,而CSP则通过技术性的低级语言来表达保证。要解决这一差距,关键是为客户和CSP找到一种通用语言。本文的目标是提供一种基于本体的协商服务,允许客户在不同的csp之间协商感兴趣的安全级别,并有可能选择最佳的安全产品;安全本体是作为公共语义语言的基础而开发的,客户和提供者将不得不使用这种语言来表达安全特性和需求。
{"title":"Ontology-based Negotiation of security requirements in cloud","authors":"L. Liccardo, M. Rak, G. Modica, O. Tomarchio","doi":"10.1109/CASoN.2012.6412401","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412401","url":null,"abstract":"The Cloud Computing paradigm attracts many customers because of the potentialities it promises. Despite of many benefits, a widespread adoption is limited by many issues that potential customers still have to face. Security in the cloud is one of the main concern for the customer. The Cloud Service Provider (CSP) is responsible of providing security to customers and assuring that their data and application are properly secured. In this context, the concept of Service Level Agreement (SLA) assumes a great importance. It can be used as a means to formalize and establish in a contract what must effectively be granted in terms of security levels. There is actually Semantic Gap between how security guarantees are intended respectively by customers and providers. A customer is inclined to express security in terms of high-level requirements, while a CSP expresses guarantees through a technical, low-level language. To address this gap, the key is to find a common language for both the customer and the CSP. The goal of this paper is to offer an Ontology-based Negotiation Service allowing a customer to negotiate the interested security level among different CSPs, with the possibility to choose the best security offering; a Security Ontology was developed as a basis for a common semantic language that customers and providers will have to use to express security features and requirements.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116639660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An algorithm to achieve k-anonymity and l-diversity anonymisation in social networks 一种实现社交网络k-匿名和l-多样性匿名的算法
B. Tripathy, A. Mitra
The development of several popular social networks in recent days and publication of social network data has led to the danger of disclosure of sensitive information of individuals. This necessitated the preservation of privacy before the publication of such data. There are several algorithms developed to preserve privacy in micro data. But these algorithms cannot be applied directly as in social networks the nodes have structural properties along with their labels. k-anonymity and l-diversity are efficient tools to anonymise micro data. So efforts have been made to find out similar algorithms to handle social network anonymisation. In this paper we propose an algorithm which can be used to achieve k-anonymity and l-diversity in social network anonymisation. This algorithm is based upon some existing algorithms developed in this direction.
近年来几个热门社交网络的发展和社交网络数据的公开导致了个人敏感信息泄露的危险。这就需要在公布这些数据之前保护隐私。为了保护微数据的隐私,已经开发了几种算法。但这些算法不能直接应用,因为在社交网络中,节点与它们的标签一起具有结构属性。k-匿名和l-多样性是实现微数据匿名化的有效工具。因此,人们一直在努力寻找类似的算法来处理社交网络匿名。本文提出了一种可以实现社交网络匿名中k-匿名和l-多样性的算法。该算法是在现有算法的基础上发展起来的。
{"title":"An algorithm to achieve k-anonymity and l-diversity anonymisation in social networks","authors":"B. Tripathy, A. Mitra","doi":"10.1109/CASoN.2012.6412390","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412390","url":null,"abstract":"The development of several popular social networks in recent days and publication of social network data has led to the danger of disclosure of sensitive information of individuals. This necessitated the preservation of privacy before the publication of such data. There are several algorithms developed to preserve privacy in micro data. But these algorithms cannot be applied directly as in social networks the nodes have structural properties along with their labels. k-anonymity and l-diversity are efficient tools to anonymise micro data. So efforts have been made to find out similar algorithms to handle social network anonymisation. In this paper we propose an algorithm which can be used to achieve k-anonymity and l-diversity in social network anonymisation. This algorithm is based upon some existing algorithms developed in this direction.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126589555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1