{"title":"Big Data in Health Informatics Architecture","authors":"E. R. Onyejekwe","doi":"10.1109/ASONAM.2014.6921667","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921667","url":null,"abstract":"This paper narrates the current status of Big Data in the healthcare industry and how the industry could derive big benefits from Big Data. The role of Big Data (and perhaps its analytics) in scripting a Health Informatics (HI) text book is, therefore, the focus of this paper. For starters, HI Architecture can be conceptualized through data collected by the survey instrument provided at the end.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134559719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ASONAM 2014 tutorials [2 abstracts]","authors":"Hsun-Ping Hsieh, Cheng-te Li, C. Tan","doi":"10.1109/ASONAM.2014.6921549","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921549","url":null,"abstract":"This tutorial discusses the following: Route Planning in Geo-Social Media; Network Inference for Cyber Security in Online Social Networks.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130552858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recommendation in Academia: A joint multi-relational model","authors":"Zaihan Yang, Dawei Yin, Brian D. Davison","doi":"10.1109/ASONAM.2014.6921643","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921643","url":null,"abstract":"In this paper, we target at four specific recommendation tasks in the academic environment: the recommendation for author coauthorships, paper citation recommendation for authors, paper citation recommendation for papers, and publishing venue recommendation for author-paper pairs. Different from previous work which tackles each of these tasks separately while neglecting their mutual effect and connection, we propose a joint multi-relational model that can exploit the latent correlation between relations and solve several tasks in a unified way. Moreover, for better ranking purpose, we extend the work maximizing MAP over one single tensor, and make it applicable to maximize MAP over multiple matrices and tensors. Experiments conducted over two real world data sets demonstrate the effectiveness of our model: 1) improved performance can be achieved with joint modeling over multiple relations; 2) our model can outperform three state-of-the art algorithms for several tasks.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125099176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying relevant event content for real-time event detection","authors":"Xinyue Wang, L. Tokarchuk, S. Poslad","doi":"10.1109/ASONAM.2014.6921616","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921616","url":null,"abstract":"A variety of event detection algorithms for microblog services have been proposed, but their accuracy relies on the microblog feeds they analyse. Existing research explores datasets that are collected using either a set of manually predefined terms or information from external sources. These methods fail to provide comprehensive and quality feeds for real-time event detection. In this paper, we present a novel adaptive keyword identification approach to retrieve a greater amount of event relevant content. This approach continuously monitors emerging hashtags and rates them by their similarity to specific pre-defined event hashtags using TF-IDF vectors. Top rated emerging hashtags are added as filter criteria in real time. By comparing our proposed approach, called CETRe (Content-based Event Tweet Retrieval) with an existing baseline approach applied to real-world events, we show that CETRe not only identifies event topics and contents, but also enables better event detection.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122395660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Behavioral detection of spam URL sharing: Posting patterns versus click patterns","authors":"C. Cao, James Caverlee","doi":"10.1109/ASONAM.2014.6921573","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921573","url":null,"abstract":"Social media systems like Twitter and Facebook provide a global infrastructure for sharing information, and in one popular direction, of sharing web hyperlinks. Understanding the behavioral signals of both how URLs are inserted into these systems (via posting by users) and how URLs are received by social media users (via clicking) can provide new insights into social media search, recommendation, and user profiling, among many others. Such studies, however, have traditionally been difficult due to the proprietary (and sometimes private) nature of much URL-related data. Hence, in this paper, we begin a behavioral examination of URL sharing through two distinct perspectives: (i) the first is via a study of how these links are posted through publicly-accessible Twitter data; (ii) the second is via a study of how these links are received by measuring their click patterns through the publicly-accessible Bitly click API. We examine the differences between posting and click patterns in a sample application domain: the classification of spam URLs. We find that these behavioral signals - posting versus clicking - provide overlapping but fundamentally different perspectives on URLs, and that these perspectives can inform the design of future applications of spam link detection and link sharing.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114444395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Location inference using microblog text and friendships","authors":"Chuanyang Li, Xiuqin Lin, Bin Wu, C. Shi","doi":"10.1109/ASONAM.2014.6921674","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921674","url":null,"abstract":"In this paper, we proposed a novel scheme to infer user's location using microblog text and friendships, without known geo information. The major part of our research is identifying local words, words that associated with some particular location. With local words we identified, we use conditional random fields (CRF), to detect location specific microblog. Then we can estimate the most possible location of a user. And we take advantage of users' friendships to improve the result. Another key feature of our approach is that we consider timeliness of local words, as some local words are descriptions of local events and they are only associated with location during a certain period of time. Experimental evidence suggests that our algorithm works well in practice and outperforms the existing algorithms for estimating the location of microblog users.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128431728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An modularity-based overlapping community structure detecting algorithm","authors":"Kui Meng, Gongshen Liu, Qiong Hu, Jianhua Li","doi":"10.1109/ASONAM.2014.6921569","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921569","url":null,"abstract":"Many algorithms have been designed to detect community structure in social networks. However, most algorithms can only detect disjoint communities effectively. A new overlapping community structure detecting algorithm is proposed in this paper, which adopts modularity to community clustering. In order to evaluate the algorithm, Modularity by Newman and the NMI (Normalized Mutual Information) by Lancichinetti are used as the evaluation metrics. It is approved by the experiments that the proposed method works well to the real overlapping communities.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130532162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cluster cascades: Infer multiple underlying networks using diffusion data","authors":"Ming Yang, C. Chou, Ming-Syan Chen","doi":"10.1109/ASONAM.2014.6921597","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921597","url":null,"abstract":"Information diffusion and virus propagation are the fundamental processes often taking place in networks. The problem of devising a strategy to facilitate or block such process has received a considerable amount of attention. A major challenge therein is that the underlying network of diffusion is often hidden. Most researchers dealing with this issue assume only one underlying network over which cascades spread. However, in the real world, whether the transmission pathways of a contagion, a piece of information, emerge or not depends on many factors, such as the topic of the information and the time when the information is first mentioned. In our opinion, it is impractical to model the diffusion processes by using only a single network when information is of all kind and diffuses in different underlying topic-specific networks. In this paper, we formulate a problem of K-network inference, inferring K underlying diffusion networks, based on a proposed probabilistic generative mixture model that models the generation of cascades. We further propose an algorithm that could cluster similar cascades and infer the corresponding underlying network for each cluster in the Expectation-Maximization framework. Finally, in experiments, we show that our algorithm could cluster cascades and infer the underlying networks effectively.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129122492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning the information diffusion probabilities by using variance regularized EM algorithm","authors":"Hai-Guang Li, Tianyu Cao, Zhao Li","doi":"10.1109/ASONAM.2014.6921596","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921596","url":null,"abstract":"In this paper we address the problem of learning the information diffusion probabilities when there is no sufficient data of information diffusion. By observing the information diffusion behavior on the popular social network web-site Twitter, we find that the evidence of information diffusion is extremely sparse. Less than one percent of tweets are retweeted, which is considered as the most important form of information diffusion evidence on Twitter. Previous research on predicting information diffusion probabilities has failed under such scenarios because the problem of over fitting. To overcome this problem, we first propose to use the variance of the diffusion probabilities as a measure of model complexity for the independent cascade model. After that, we propose two regularization schemes to reduce model complexity. The first scheme is based on regularizing the variance of the diffusion probabilities directly. The second scheme is based on regularizing the mean absolute deviation of the logarithm of the diffusion probabilities. We are able to derive an approximation solution for the first scheme and analytical solution to the second scheme. We conduct experiments by simulating information diffusion on six social network datasets. Experimental results show that the variance regularization scheme outperforms the baseline by a noticeable margin. The mean absolute deviation regularization scheme is better than the baseline.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124108296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scanning network communities with power-law-distributed attributes","authors":"Tai-Chi Wang, F. Phoa","doi":"10.1109/ASONAM.2014.6921584","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921584","url":null,"abstract":"Community detection has drawn significant attention as network generates big data every day. To simultaneously consider both attribute and structure cluster patterns, a scanning method [1] is recently developed to provide a statistical testing procedures. Some common distributions are considered in [1] except the power-law distribution, which network attributes are generally followed. This paper aims at extending the scanning method to be applied in a social network that its attributes follow power-law distribution. Besides the theoretical construction, an authorship network is used to demonstrate the proposed method.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123395472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}