首页 > 最新文献

2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)最新文献

英文 中文
Networks and network analysis for defence and security 国防和安全的网络和网络分析
A. Masys
Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. For example, acts of terrorism and organized crime are considered one of the greatest threats to national security. In the UK alone, the social and economic costs associated with organized crime are estimated between £20 and £40 billion per year (NCA, 2011:4). Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples that highlight the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic wellbeing of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of `big data' and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies and vulnerabilities. This poster paper introduces relevant theoretical frameworks and applications of network analysis in support of the defence and security domain. This paper reflects the body of contributions by leading researchers to an upcoming book entitled: Networks and Network Analysis for Defence and Security, Springer Publishing.
自然灾害、武装暴力行为、恐怖主义以及严重和有组织犯罪对区域、国家和全球系统造成的冲击具有重大的国防和安全影响。今天,各国面临着不确定和复杂的安全形势,其中威胁影响/目标是物理,社会,经济和网络领域。例如,恐怖主义行为和有组织犯罪被认为是对国家安全的最大威胁之一。仅在英国,与有组织犯罪相关的社会和经济成本估计每年在200亿至400亿英镑之间(NCA, 2011:4)。对国家安全的威胁,例如对关键基础设施的威胁,不仅来自人为行为,也来自自然灾害。卡特里娜(2005年)、福岛(2011年)和桑迪飓风(2012年)就是突出了关键基础设施在自然灾害面前的脆弱性,以及它们对社区和国家的社会和经济福祉造成的严重影响的例子。在这种动态和复杂的威胁环境下,网络分析已经成为支持国防和安全的关键推动者。随着“大数据”的出现和处理能力的提高,网络分析可以揭示有关结构和动态特性的见解,从而促进对复杂网络、其实体、相互依赖性和脆弱性的更好理解。本文介绍了网络分析的相关理论框架和应用,以支持国防和安全领域。这篇论文反映了主要研究人员对即将出版的一本书的贡献:网络和网络分析国防和安全,施普林格出版社。
{"title":"Networks and network analysis for defence and security","authors":"A. Masys","doi":"10.1145/2492517.2492602","DOIUrl":"https://doi.org/10.1145/2492517.2492602","url":null,"abstract":"Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. For example, acts of terrorism and organized crime are considered one of the greatest threats to national security. In the UK alone, the social and economic costs associated with organized crime are estimated between £20 and £40 billion per year (NCA, 2011:4). Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples that highlight the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic wellbeing of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of `big data' and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies and vulnerabilities. This poster paper introduces relevant theoretical frameworks and applications of network analysis in support of the defence and security domain. This paper reflects the body of contributions by leading researchers to an upcoming book entitled: Networks and Network Analysis for Defence and Security, Springer Publishing.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127366338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Chelsea won, and you bought a T-shirt: Characterizing the interplay between Twitter and e-commerce 切尔西赢了,你买了一件t恤:推特和电子商务的互动特征
Haipeng Zhang, Nish Parikh, Gyanit Singh, Neel Sundaresan
The popularity of social media sites like Twitter and Facebook opens up interesting research opportunities for understanding the interplay of social media and e-commerce. Most research on online behavior, up until recently, has focused mostly on social media behaviors and e-commerce behaviors independently. In our study we choose a particular global e-commerce platform (eBay) and a particular global social media platform (Twitter). We quantify the characteristics of the two individual trends as well as the correlations between them. We provide evidences that about 5% of general eBay query streams show strong positive correlations with the corresponding Twitter mention streams, while the percentage jumps to around 25% for trending eBay query streams. Some categories of eBay queries, such as `Video Games' and `Sports', are more likely to have strong correlations. We also discover that eBay trend lags Twitter for correlated pairs and the lag differs across categories. We show evidences that celebrities' popularities on Twitter correlate well with their relevant search and sales on eBay. The correlations and lags provide predictive insights for future applications that might lead to instant merchandising opportunities for both sellers and e-commerce platforms.
Twitter和Facebook等社交媒体网站的流行为了解社交媒体和电子商务的相互作用提供了有趣的研究机会。到目前为止,大多数关于网络行为的研究主要集中在社交媒体行为和电子商务行为上。在我们的研究中,我们选择了一个特定的全球电子商务平台(eBay)和一个特定的全球社交媒体平台(Twitter)。我们量化了两个单独趋势的特征以及它们之间的相关性。我们提供的证据表明,大约5%的一般eBay查询流与相应的Twitter提及流表现出强烈的正相关性,而趋势eBay查询流的这一比例跃升至25%左右。eBay搜索的某些类别,如“视频游戏”和“体育”,更可能有很强的相关性。我们还发现eBay的趋势滞后于Twitter的相关配对,并且不同类别的滞后是不同的。我们展示的证据表明,名人在Twitter上的受欢迎程度与他们在eBay上的相关搜索和销售密切相关。相关性和滞后性为未来的应用程序提供了预测性见解,这些应用程序可能会为卖家和电子商务平台带来即时销售机会。
{"title":"Chelsea won, and you bought a T-shirt: Characterizing the interplay between Twitter and e-commerce","authors":"Haipeng Zhang, Nish Parikh, Gyanit Singh, Neel Sundaresan","doi":"10.1145/2492517.2500302","DOIUrl":"https://doi.org/10.1145/2492517.2500302","url":null,"abstract":"The popularity of social media sites like Twitter and Facebook opens up interesting research opportunities for understanding the interplay of social media and e-commerce. Most research on online behavior, up until recently, has focused mostly on social media behaviors and e-commerce behaviors independently. In our study we choose a particular global e-commerce platform (eBay) and a particular global social media platform (Twitter). We quantify the characteristics of the two individual trends as well as the correlations between them. We provide evidences that about 5% of general eBay query streams show strong positive correlations with the corresponding Twitter mention streams, while the percentage jumps to around 25% for trending eBay query streams. Some categories of eBay queries, such as `Video Games' and `Sports', are more likely to have strong correlations. We also discover that eBay trend lags Twitter for correlated pairs and the lag differs across categories. We show evidences that celebrities' popularities on Twitter correlate well with their relevant search and sales on eBay. The correlations and lags provide predictive insights for future applications that might lead to instant merchandising opportunities for both sellers and e-commerce platforms.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132609115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Network similarity via multiple social theories 多重社会理论的网络相似性
M. Berlingerio, Danai Koutra, Tina Eliassi-Rad, C. Faloutsos
Given a set of k networks, possibly with different sizes and no overlaps in nodes or links, how can we quickly assess similarity between them? Analogously, are there a set of social theories which, when represented by a small number of descriptive, numerical features, effectively serve as a “signature” for the network? Having such signatures will enable a wealth of graph mining and social network analysis tasks, including clustering, outlier detection, visualization, etc. We propose a novel, effective, and scalable method, called NetSimile, for solving the above problem. Our approach has the following desirable properties: (a) It is supported by a set of social theories. (b) It gives similarity scores that are size-invariant. (c) It is scalable, being linear on the number of links for graph signature extraction. In extensive experiments on numerous synthetic and real networks from disparate domains, NetSimile outperforms baseline competitors. We also demonstrate how our approach enables several mining tasks such as clustering, visualization, discontinuity detection, network transfer learning, and re-identification across networks.
给定一组k个网络,可能有不同的大小,节点或链接中没有重叠,我们如何快速评估它们之间的相似性?类似地,是否存在一套社会理论,当由少量描述性的数字特征表示时,有效地充当网络的“签名”?拥有这样的签名将使大量的图挖掘和社会网络分析任务成为可能,包括聚类、离群点检测、可视化等。为了解决上述问题,我们提出了一种新颖、有效、可扩展的方法,称为net明码。我们的方法有以下可取之处:(a)它得到了一套社会理论的支持。(b)它给出了大小不变的相似性分数。(c)它是可扩展的,在图签名提取的链接数量上是线性的。在对来自不同领域的大量合成和真实网络进行的广泛实验中,net明喻的表现优于基准竞争对手。我们还演示了我们的方法如何实现几个挖掘任务,如聚类、可视化、不连续检测、网络迁移学习和跨网络的重新识别。
{"title":"Network similarity via multiple social theories","authors":"M. Berlingerio, Danai Koutra, Tina Eliassi-Rad, C. Faloutsos","doi":"10.1145/2492517.2492582","DOIUrl":"https://doi.org/10.1145/2492517.2492582","url":null,"abstract":"Given a set of k networks, possibly with different sizes and no overlaps in nodes or links, how can we quickly assess similarity between them? Analogously, are there a set of social theories which, when represented by a small number of descriptive, numerical features, effectively serve as a “signature” for the network? Having such signatures will enable a wealth of graph mining and social network analysis tasks, including clustering, outlier detection, visualization, etc. We propose a novel, effective, and scalable method, called NetSimile, for solving the above problem. Our approach has the following desirable properties: (a) It is supported by a set of social theories. (b) It gives similarity scores that are size-invariant. (c) It is scalable, being linear on the number of links for graph signature extraction. In extensive experiments on numerous synthetic and real networks from disparate domains, NetSimile outperforms baseline competitors. We also demonstrate how our approach enables several mining tasks such as clustering, visualization, discontinuity detection, network transfer learning, and re-identification across networks.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122191596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Lab-on-a-Chip turns soft: Computer-aided, software-enabled microfluidics design 芯片实验室变软:计算机辅助、软件驱动的微流体设计
A. K. Soe, M. Fielding, S. Nahavandi
The current practice of designing microfluidic Lab-on-a-Chip (LoCs) limits reusing designs and makes sharing tasks among researchers difficult. One way to achieve that objective is to borrow best practices from engineering. Also it takes a lot of skills to design LoCs. Design-by-assembly in which a LoC can be designed by configuring, laying out subsystems can help new researchers to develop custom chips. Flexible, reusable, and rapid-prototyping-feasible LoC designs can be achieved by fabricated modular microfluidic blocks. However, challenging problems still persist, which limit the usefulness of prefabricated blocks. We propose software microfluidic modules (SoftMABs) based design technique to solve issues fabricated modules face. By configuring SoftMABs, integrating them, the new assembly of SoftMABs can form a 3D LoC design ready to be prototyped. The proposed method can make designing a complex LoC less challenging, and collaborating among laboratories easier. We created SoftMABs and designed a custom microfluidic chip by assembling SoftMABs like LEGOs, dragging-and-dropping them. Later we reconfigured them - by replacing a SoftMAB with another module - to make a new LoC. We believe this computer-aided method is an interesting and useful LoC design technique.
目前设计微流控芯片实验室(loc)的实践限制了设计的重复使用,并使研究人员之间的任务共享变得困难。实现这一目标的一种方法是从工程中借鉴最佳实践。此外,设计loc也需要很多技能。通过装配设计,LoC可以通过配置、布局子系统来设计,这可以帮助新的研究人员开发定制芯片。灵活、可重复使用和快速原型化可行的LoC设计可以通过制造模块化微流控块来实现。然而,具有挑战性的问题仍然存在,这限制了预制块的实用性。本文提出了基于软件微流控模块(softmab)的设计技术来解决制造模块所面临的问题。通过对softmab进行配置和集成,softmab的新组装可以形成一个3D LoC设计,准备进行原型设计。该方法可以降低设计复杂LoC的难度,并使实验室之间的协作更加容易。我们创造了softmab,并设计了一个定制的微流控芯片,将softmab像乐高积木一样组装起来,拖放它们。后来我们重新配置了它们——用另一个模块替换了一个SoftMAB——来创建一个新的LoC。我们相信这种计算机辅助方法是一种有趣而有用的LoC设计技术。
{"title":"Lab-on-a-Chip turns soft: Computer-aided, software-enabled microfluidics design","authors":"A. K. Soe, M. Fielding, S. Nahavandi","doi":"10.1145/2492517.2500230","DOIUrl":"https://doi.org/10.1145/2492517.2500230","url":null,"abstract":"The current practice of designing microfluidic Lab-on-a-Chip (LoCs) limits reusing designs and makes sharing tasks among researchers difficult. One way to achieve that objective is to borrow best practices from engineering. Also it takes a lot of skills to design LoCs. Design-by-assembly in which a LoC can be designed by configuring, laying out subsystems can help new researchers to develop custom chips. Flexible, reusable, and rapid-prototyping-feasible LoC designs can be achieved by fabricated modular microfluidic blocks. However, challenging problems still persist, which limit the usefulness of prefabricated blocks. We propose software microfluidic modules (SoftMABs) based design technique to solve issues fabricated modules face. By configuring SoftMABs, integrating them, the new assembly of SoftMABs can form a 3D LoC design ready to be prototyped. The proposed method can make designing a complex LoC less challenging, and collaborating among laboratories easier. We created SoftMABs and designed a custom microfluidic chip by assembling SoftMABs like LEGOs, dragging-and-dropping them. Later we reconfigured them - by replacing a SoftMAB with another module - to make a new LoC. We believe this computer-aided method is an interesting and useful LoC design technique.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130517991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Online activity traces around a “Boston bomber” 网络活动追踪“波士顿炸弹客”
Alexander Semenov, Alexander G. Nikolaev, J. Veijalainen
This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.
这篇论文描述了在悲剧发生后,波士顿马拉松爆炸案嫌疑人的在线社交网络档案周围的用户活动痕迹。这些分析数据是在一款自动社交媒体监控软件的帮助下收集的,包括在爆炸嫌疑人姓名公布时保存的肇事者页面,以及随后其他用户在该页面上留下的评论。分析表明,及时保护犯罪分子的网络媒体记录,有助于防止与嫌疑人/罪犯的想法、信息和联系有关的通信交流大规模公开传播。
{"title":"Online activity traces around a “Boston bomber”","authors":"Alexander Semenov, Alexander G. Nikolaev, J. Veijalainen","doi":"10.1145/2492517.2500316","DOIUrl":"https://doi.org/10.1145/2492517.2500316","url":null,"abstract":"This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116789256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Compensatory seeding in networks with varying avaliability of nodes 节点可用性变化网络中的补偿播种
Jarosław Jankowski, Radosław Michalski, Przemyslaw Kazienko
Diffusion of information in social networks takes more and more attention from marketers. New methods and algorithms are constantly developed towards maximizing reach of the campaigns and increasing their effectiveness. One of the important research directions in this area is related to selecting initial nodes of the campaign to result with maximizing its effects represented as total number of infections. To achieve this goal, several strategies were developed and they are based on different network measures and other characteristics of users. The problem is that most of these strategies base on static network properties while typical online networks change over time and are sensitive to varying activity of users. In this work a novel strategy is proposed which is based on multiple measures with additional parameters related to nodes availability in time periods prior to the campaign. Presented results show that it is possible to compensate users with high network measures by others having high frequency of system usage, which, instead, may be easier or cheaper to acquire.
社交网络中的信息扩散越来越受到营销人员的关注。不断开发新的方法和算法,以最大限度地扩大活动范围并提高其有效性。该领域的一个重要研究方向是选择运动的初始节点,使其效果最大化,表示为感染总数。为了实现这一目标,开发了几种策略,它们基于不同的网络措施和用户的其他特征。问题是,这些策略大多基于静态网络属性,而典型的在线网络会随着时间的推移而变化,并且对用户活动的变化很敏感。在这项工作中,提出了一种新的策略,该策略基于与活动之前时间段内节点可用性相关的附加参数的多个度量。所提出的结果表明,可以通过其他具有高系统使用频率的用户来补偿具有高网络度量的用户,而这些用户可能更容易或更便宜地获得。
{"title":"Compensatory seeding in networks with varying avaliability of nodes","authors":"Jarosław Jankowski, Radosław Michalski, Przemyslaw Kazienko","doi":"10.1145/2492517.2500256","DOIUrl":"https://doi.org/10.1145/2492517.2500256","url":null,"abstract":"Diffusion of information in social networks takes more and more attention from marketers. New methods and algorithms are constantly developed towards maximizing reach of the campaigns and increasing their effectiveness. One of the important research directions in this area is related to selecting initial nodes of the campaign to result with maximizing its effects represented as total number of infections. To achieve this goal, several strategies were developed and they are based on different network measures and other characteristics of users. The problem is that most of these strategies base on static network properties while typical online networks change over time and are sensitive to varying activity of users. In this work a novel strategy is proposed which is based on multiple measures with additional parameters related to nodes availability in time periods prior to the campaign. Presented results show that it is possible to compensate users with high network measures by others having high frequency of system usage, which, instead, may be easier or cheaper to acquire.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132171026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Recommender system by grasping individual preference and influence from other users 推荐系统通过掌握个人偏好和其他用户的影响
Tae Sato, Masanori Fujita, Minoru Kobayashi, Koji Ito
We propose a recommendation method that considers the user's individual preference and influence from other users in social media. This method predicts the user's individual preference and influence from other users by applying the probability of divergence from random-selection based on a statistical hypothesis test as a form of modified content-based filtering. We evaluated the proposed method by focusing on the rate at which items that have recommended tags are contained among all items. The proposed method is shown to have higher accuracy than traditional content-based filtering. It is especially effective when some percentage of the items have recommendation tags.
我们提出了一种考虑用户个人偏好和社交媒体中其他用户影响的推荐方法。该方法将基于统计假设检验的随机选择的偏离概率作为一种改进的基于内容的过滤形式,预测用户的个人偏好和其他用户的影响。我们通过关注具有推荐标签的项目在所有项目中的包含率来评估所提出的方法。结果表明,该方法比传统的基于内容的过滤方法具有更高的准确率。当一定比例的项目有推荐标签时,这种方法尤其有效。
{"title":"Recommender system by grasping individual preference and influence from other users","authors":"Tae Sato, Masanori Fujita, Minoru Kobayashi, Koji Ito","doi":"10.1145/2492517.2500283","DOIUrl":"https://doi.org/10.1145/2492517.2500283","url":null,"abstract":"We propose a recommendation method that considers the user's individual preference and influence from other users in social media. This method predicts the user's individual preference and influence from other users by applying the probability of divergence from random-selection based on a statistical hypothesis test as a form of modified content-based filtering. We evaluated the proposed method by focusing on the rate at which items that have recommended tags are contained among all items. The proposed method is shown to have higher accuracy than traditional content-based filtering. It is especially effective when some percentage of the items have recommendation tags.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124192025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
How do people link? Analysis of contact structures in human face-to-face proximity networks 人们是如何联系起来的?人类面对面接近网络中的接触结构分析
Christoph Scholz, M. Atzmüller, Mark Kibanov, Gerd Stumme
Understanding the process of link creation is rather important for link prediction in social networks. Therefore, this paper analyzes contact structures in networks of face-to-face spatial proximity, and presents new insights on the dynamic and static contact behavior in such real world networks. We focus on face-to-face contact networks collected at different conferences using the social conference guidance system Conferator. Specifically, we investigate the strength of ties and its connection to triadic closures in face-to-face proximity networks. Furthermore, we analyze the predictability of all, new and recurring links at different points of time during the conference. In addition, we consider network dynamics for the prediction of new links.
了解链接创建的过程对于社交网络中的链接预测非常重要。因此,本文分析了面对面空间接近网络中的接触结构,并对这种现实世界网络中的动态和静态接触行为提出了新的见解。我们专注于使用社交会议指导系统Conferator在不同会议上收集的面对面联系网络。具体来说,我们研究了面对面接近网络中联系的强度及其与三合一闭包的联系。此外,我们分析了会议期间不同时间点的所有新链接和重复链接的可预测性。此外,我们考虑网络动力学预测新的链接。
{"title":"How do people link? Analysis of contact structures in human face-to-face proximity networks","authors":"Christoph Scholz, M. Atzmüller, Mark Kibanov, Gerd Stumme","doi":"10.1145/2492517.2492521","DOIUrl":"https://doi.org/10.1145/2492517.2492521","url":null,"abstract":"Understanding the process of link creation is rather important for link prediction in social networks. Therefore, this paper analyzes contact structures in networks of face-to-face spatial proximity, and presents new insights on the dynamic and static contact behavior in such real world networks. We focus on face-to-face contact networks collected at different conferences using the social conference guidance system Conferator. Specifically, we investigate the strength of ties and its connection to triadic closures in face-to-face proximity networks. Furthermore, we analyze the predictability of all, new and recurring links at different points of time during the conference. In addition, we consider network dynamics for the prediction of new links.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124512754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Exploiting hashtags for adaptive microblog crawling 利用标签进行自适应微博爬行
Xinyue Wang, L. Tokarchuk, F. Cuadrado, S. Poslad
Researchers have capitalized on microblogging services, such as Twitter, for detecting and monitoring real world events. Existing approaches have based their conclusions on data collected by monitoring a set of pre-defined keywords. In this paper, we show that this manner of data collection risks losing a significant amount of relevant information. We then propose an adaptive crawling model that detects emerging popular hashtags, and monitors them to retrieve greater amounts of highly associated data for events of interest. The proposed model analyzes the traffic patterns of the hashtags collected from the live stream to update subsequent collection queries. To evaluate this adaptive crawling model, we apply it to a dataset collected during the 2012 London Olympic Games. Our analysis shows that adaptive crawling based on the proposed Refined Keyword Adaptation algorithm collects a more comprehensive dataset than pre-defined keyword crawling, while only introducing a minimum amount of noise.
研究人员利用微博服务,如Twitter,来检测和监控现实世界的事件。现有的方法是根据监测一组预定义关键字收集的数据得出结论的。在本文中,我们表明这种数据收集方式有丢失大量相关信息的风险。然后,我们提出了一种自适应爬行模型,可以检测新兴的流行标签,并对它们进行监控,以检索更多的高度相关的数据,以获取感兴趣的事件。该模型分析从直播流中收集的标签的流量模式,以更新后续的收集查询。为了评估这种自适应爬行模型,我们将其应用于2012年伦敦奥运会期间收集的数据集。我们的分析表明,基于改进关键字自适应算法的自适应爬行比预定义关键字爬行收集了更全面的数据集,同时只引入了最少的噪声。
{"title":"Exploiting hashtags for adaptive microblog crawling","authors":"Xinyue Wang, L. Tokarchuk, F. Cuadrado, S. Poslad","doi":"10.1145/2492517.2492624","DOIUrl":"https://doi.org/10.1145/2492517.2492624","url":null,"abstract":"Researchers have capitalized on microblogging services, such as Twitter, for detecting and monitoring real world events. Existing approaches have based their conclusions on data collected by monitoring a set of pre-defined keywords. In this paper, we show that this manner of data collection risks losing a significant amount of relevant information. We then propose an adaptive crawling model that detects emerging popular hashtags, and monitors them to retrieve greater amounts of highly associated data for events of interest. The proposed model analyzes the traffic patterns of the hashtags collected from the live stream to update subsequent collection queries. To evaluate this adaptive crawling model, we apply it to a dataset collected during the 2012 London Olympic Games. Our analysis shows that adaptive crawling based on the proposed Refined Keyword Adaptation algorithm collects a more comprehensive dataset than pre-defined keyword crawling, while only introducing a minimum amount of noise.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116810319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Enhancing tag-based collaborative filtering via integrated social networking information 通过整合社交网络信息增强基于标签的协同过滤
Sogol Naseri, Arash Bahrehmand, Chen Ding, Chi-Hung Chi
Recently, researchers have taken tremendous strides in attempting to synthesize conventional social judgments and automated filtering within recommender systems. In this study, we aim to enhance recommendation efficiency via integrating social networking information with traditional recommendation algorithms. To achieve this objective, we first propose a new user similarity metric that not only considers tagging activities of users, but also incorporates their social relationships, such as friendship and membership, in measuring the closeness of two users. Subsequently, we define a new item prediction method which makes use of both user-to-user similarity and item-to-item similarity. Experimental outcomes on Last.fm show some positive results that attest the efficiency of our proposed approach.
最近,研究人员在尝试综合传统的社会判断和推荐系统中的自动过滤方面取得了巨大进展。在本研究中,我们的目标是通过将社交网络信息与传统推荐算法相结合来提高推荐效率。为了实现这一目标,我们首先提出了一种新的用户相似度度量,该度量不仅考虑了用户的标记活动,还结合了他们的社会关系,如友谊和成员关系,来衡量两个用户的亲密度。随后,我们定义了一种同时利用用户与用户相似度和物品与物品相似度的物品预测方法。最后的实验结果。FM显示了一些积极的结果,证明了我们所提出的方法的有效性。
{"title":"Enhancing tag-based collaborative filtering via integrated social networking information","authors":"Sogol Naseri, Arash Bahrehmand, Chen Ding, Chi-Hung Chi","doi":"10.1145/2492517.2492658","DOIUrl":"https://doi.org/10.1145/2492517.2492658","url":null,"abstract":"Recently, researchers have taken tremendous strides in attempting to synthesize conventional social judgments and automated filtering within recommender systems. In this study, we aim to enhance recommendation efficiency via integrating social networking information with traditional recommendation algorithms. To achieve this objective, we first propose a new user similarity metric that not only considers tagging activities of users, but also incorporates their social relationships, such as friendship and membership, in measuring the closeness of two users. Subsequently, we define a new item prediction method which makes use of both user-to-user similarity and item-to-item similarity. Experimental outcomes on Last.fm show some positive results that attest the efficiency of our proposed approach.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"12 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116824350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1