2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)最新文献

筛选
英文 中文
Big Data in Health Informatics Architecture 健康信息架构中的大数据
E. R. Onyejekwe
{"title":"Big Data in Health Informatics Architecture","authors":"E. R. Onyejekwe","doi":"10.1109/ASONAM.2014.6921667","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921667","url":null,"abstract":"This paper narrates the current status of Big Data in the healthcare industry and how the industry could derive big benefits from Big Data. The role of Big Data (and perhaps its analytics) in scripting a Health Informatics (HI) text book is, therefore, the focus of this paper. For starters, HI Architecture can be conceptualized through data collected by the survey instrument provided at the end.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134559719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ASONAM 2014 tutorials [2 abstracts] ASONAM 2014教程[2个摘要]
Hsun-Ping Hsieh, Cheng-te Li, C. Tan
{"title":"ASONAM 2014 tutorials [2 abstracts]","authors":"Hsun-Ping Hsieh, Cheng-te Li, C. Tan","doi":"10.1109/ASONAM.2014.6921549","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921549","url":null,"abstract":"This tutorial discusses the following: Route Planning in Geo-Social Media; Network Inference for Cyber Security in Online Social Networks.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130552858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recommendation in Academia: A joint multi-relational model 学术界的建议:联合多关系模型
Zaihan Yang, Dawei Yin, Brian D. Davison
{"title":"Recommendation in Academia: A joint multi-relational model","authors":"Zaihan Yang, Dawei Yin, Brian D. Davison","doi":"10.1109/ASONAM.2014.6921643","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921643","url":null,"abstract":"In this paper, we target at four specific recommendation tasks in the academic environment: the recommendation for author coauthorships, paper citation recommendation for authors, paper citation recommendation for papers, and publishing venue recommendation for author-paper pairs. Different from previous work which tackles each of these tasks separately while neglecting their mutual effect and connection, we propose a joint multi-relational model that can exploit the latent correlation between relations and solve several tasks in a unified way. Moreover, for better ranking purpose, we extend the work maximizing MAP over one single tensor, and make it applicable to maximize MAP over multiple matrices and tensors. Experiments conducted over two real world data sets demonstrate the effectiveness of our model: 1) improved performance can be achieved with joint modeling over multiple relations; 2) our model can outperform three state-of-the art algorithms for several tasks.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125099176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Identifying relevant event content for real-time event detection 识别相关事件内容,进行实时事件检测
Xinyue Wang, L. Tokarchuk, S. Poslad
{"title":"Identifying relevant event content for real-time event detection","authors":"Xinyue Wang, L. Tokarchuk, S. Poslad","doi":"10.1109/ASONAM.2014.6921616","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921616","url":null,"abstract":"A variety of event detection algorithms for microblog services have been proposed, but their accuracy relies on the microblog feeds they analyse. Existing research explores datasets that are collected using either a set of manually predefined terms or information from external sources. These methods fail to provide comprehensive and quality feeds for real-time event detection. In this paper, we present a novel adaptive keyword identification approach to retrieve a greater amount of event relevant content. This approach continuously monitors emerging hashtags and rates them by their similarity to specific pre-defined event hashtags using TF-IDF vectors. Top rated emerging hashtags are added as filter criteria in real time. By comparing our proposed approach, called CETRe (Content-based Event Tweet Retrieval) with an existing baseline approach applied to real-world events, we show that CETRe not only identifies event topics and contents, but also enables better event detection.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122395660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Behavioral detection of spam URL sharing: Posting patterns versus click patterns 垃圾URL共享的行为检测:发布模式与点击模式
C. Cao, James Caverlee
{"title":"Behavioral detection of spam URL sharing: Posting patterns versus click patterns","authors":"C. Cao, James Caverlee","doi":"10.1109/ASONAM.2014.6921573","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921573","url":null,"abstract":"Social media systems like Twitter and Facebook provide a global infrastructure for sharing information, and in one popular direction, of sharing web hyperlinks. Understanding the behavioral signals of both how URLs are inserted into these systems (via posting by users) and how URLs are received by social media users (via clicking) can provide new insights into social media search, recommendation, and user profiling, among many others. Such studies, however, have traditionally been difficult due to the proprietary (and sometimes private) nature of much URL-related data. Hence, in this paper, we begin a behavioral examination of URL sharing through two distinct perspectives: (i) the first is via a study of how these links are posted through publicly-accessible Twitter data; (ii) the second is via a study of how these links are received by measuring their click patterns through the publicly-accessible Bitly click API. We examine the differences between posting and click patterns in a sample application domain: the classification of spam URLs. We find that these behavioral signals - posting versus clicking - provide overlapping but fundamentally different perspectives on URLs, and that these perspectives can inform the design of future applications of spam link detection and link sharing.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114444395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Location inference using microblog text and friendships 利用微博文本和友情进行位置推断
Chuanyang Li, Xiuqin Lin, Bin Wu, C. Shi
{"title":"Location inference using microblog text and friendships","authors":"Chuanyang Li, Xiuqin Lin, Bin Wu, C. Shi","doi":"10.1109/ASONAM.2014.6921674","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921674","url":null,"abstract":"In this paper, we proposed a novel scheme to infer user's location using microblog text and friendships, without known geo information. The major part of our research is identifying local words, words that associated with some particular location. With local words we identified, we use conditional random fields (CRF), to detect location specific microblog. Then we can estimate the most possible location of a user. And we take advantage of users' friendships to improve the result. Another key feature of our approach is that we consider timeliness of local words, as some local words are descriptions of local events and they are only associated with location during a certain period of time. Experimental evidence suggests that our algorithm works well in practice and outperforms the existing algorithms for estimating the location of microblog users.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128431728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An modularity-based overlapping community structure detecting algorithm 一种基于模块化的重叠社团结构检测算法
Kui Meng, Gongshen Liu, Qiong Hu, Jianhua Li
{"title":"An modularity-based overlapping community structure detecting algorithm","authors":"Kui Meng, Gongshen Liu, Qiong Hu, Jianhua Li","doi":"10.1109/ASONAM.2014.6921569","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921569","url":null,"abstract":"Many algorithms have been designed to detect community structure in social networks. However, most algorithms can only detect disjoint communities effectively. A new overlapping community structure detecting algorithm is proposed in this paper, which adopts modularity to community clustering. In order to evaluate the algorithm, Modularity by Newman and the NMI (Normalized Mutual Information) by Lancichinetti are used as the evaluation metrics. It is approved by the experiments that the proposed method works well to the real overlapping communities.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130532162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cluster cascades: Infer multiple underlying networks using diffusion data 集群级联:使用扩散数据推断多个底层网络
Ming Yang, C. Chou, Ming-Syan Chen
{"title":"Cluster cascades: Infer multiple underlying networks using diffusion data","authors":"Ming Yang, C. Chou, Ming-Syan Chen","doi":"10.1109/ASONAM.2014.6921597","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921597","url":null,"abstract":"Information diffusion and virus propagation are the fundamental processes often taking place in networks. The problem of devising a strategy to facilitate or block such process has received a considerable amount of attention. A major challenge therein is that the underlying network of diffusion is often hidden. Most researchers dealing with this issue assume only one underlying network over which cascades spread. However, in the real world, whether the transmission pathways of a contagion, a piece of information, emerge or not depends on many factors, such as the topic of the information and the time when the information is first mentioned. In our opinion, it is impractical to model the diffusion processes by using only a single network when information is of all kind and diffuses in different underlying topic-specific networks. In this paper, we formulate a problem of K-network inference, inferring K underlying diffusion networks, based on a proposed probabilistic generative mixture model that models the generation of cascades. We further propose an algorithm that could cluster similar cascades and infer the corresponding underlying network for each cluster in the Expectation-Maximization framework. Finally, in experiments, we show that our algorithm could cluster cascades and infer the underlying networks effectively.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129122492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Learning the information diffusion probabilities by using variance regularized EM algorithm 利用方差正则化EM算法学习信息扩散概率
Hai-Guang Li, Tianyu Cao, Zhao Li
{"title":"Learning the information diffusion probabilities by using variance regularized EM algorithm","authors":"Hai-Guang Li, Tianyu Cao, Zhao Li","doi":"10.1109/ASONAM.2014.6921596","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921596","url":null,"abstract":"In this paper we address the problem of learning the information diffusion probabilities when there is no sufficient data of information diffusion. By observing the information diffusion behavior on the popular social network web-site Twitter, we find that the evidence of information diffusion is extremely sparse. Less than one percent of tweets are retweeted, which is considered as the most important form of information diffusion evidence on Twitter. Previous research on predicting information diffusion probabilities has failed under such scenarios because the problem of over fitting. To overcome this problem, we first propose to use the variance of the diffusion probabilities as a measure of model complexity for the independent cascade model. After that, we propose two regularization schemes to reduce model complexity. The first scheme is based on regularizing the variance of the diffusion probabilities directly. The second scheme is based on regularizing the mean absolute deviation of the logarithm of the diffusion probabilities. We are able to derive an approximation solution for the first scheme and analytical solution to the second scheme. We conduct experiments by simulating information diffusion on six social network datasets. Experimental results show that the variance regularization scheme outperforms the baseline by a noticeable margin. The mean absolute deviation regularization scheme is better than the baseline.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124108296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Scanning network communities with power-law-distributed attributes 扫描具有幂律分布属性的网络社区
Tai-Chi Wang, F. Phoa
{"title":"Scanning network communities with power-law-distributed attributes","authors":"Tai-Chi Wang, F. Phoa","doi":"10.1109/ASONAM.2014.6921584","DOIUrl":"https://doi.org/10.1109/ASONAM.2014.6921584","url":null,"abstract":"Community detection has drawn significant attention as network generates big data every day. To simultaneously consider both attribute and structure cluster patterns, a scanning method [1] is recently developed to provide a statistical testing procedures. Some common distributions are considered in [1] except the power-law distribution, which network attributes are generally followed. This paper aims at extending the scanning method to be applied in a social network that its attributes follow power-law distribution. Besides the theoretical construction, an authorship network is used to demonstrate the proposed method.","PeriodicalId":143584,"journal":{"name":"2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123395472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信