Milan Mirković, D. Culibrk, S. Papadopoulos, Christos Zigkolis, Y. Kompatsiaris, G. Mcardle, V. Crnojevic
{"title":"A comparative study of spatial, temporal and content-based patterns emerging in YouTube and Flickr","authors":"Milan Mirković, D. Culibrk, S. Papadopoulos, Christos Zigkolis, Y. Kompatsiaris, G. Mcardle, V. Crnojevic","doi":"10.1109/CASON.2011.6085942","DOIUrl":"https://doi.org/10.1109/CASON.2011.6085942","url":null,"abstract":"Due to the recent advances and wide adoption of Web 2.0 technologies, there is an abundance of publicly available user generated content, which can be a valuable resource for researchers, enabling them to apply sophisticated analysis methods on data of unprecedented scale. analysis methods on data of unprecedented scale.","PeriodicalId":342597,"journal":{"name":"2011 International Conference on Computational Aspects of Social Networks (CASoN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114334338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moohong Min, Donjung Choi, Jaekwang Kim, Jee-Hyong Lee
{"title":"The identification of intimate friends in personal social network","authors":"Moohong Min, Donjung Choi, Jaekwang Kim, Jee-Hyong Lee","doi":"10.1109/CASON.2011.6085950","DOIUrl":"https://doi.org/10.1109/CASON.2011.6085950","url":null,"abstract":"Nowadays, social network services, such as Twitter and Facebook, are widely being exploited. Many people have participated in social network services to enjoy the communication with their friends and to extend personal social networks. Since it is easy to extend their relations to others, people usually have a large acquaintance list in social network services. In the lists, various users, not only friends but also unfamiliar users such as celebrities, news media, or even unknown users, can be included. Because of large acquaintance lists, it is usually hard to hear from intimate users because of heavy posting from unfamiliar users. So, social network services need to identify intimate friends of users for better services. We propose a new method to identify intimate users in the acquaintance list. This method ranks people in the list based on the amount of communication and common acquaintances. We combine those with weighted parameters, which are experimentally found. It is found that users had a higher satisfaction with our method through experimentations.","PeriodicalId":342597,"journal":{"name":"2011 International Conference on Computational Aspects of Social Networks (CASoN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125142879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel social network platform by using e-marketing and evaluating models","authors":"A. Norouzi, A. Zaim","doi":"10.1109/CASON.2011.6085915","DOIUrl":"https://doi.org/10.1109/CASON.2011.6085915","url":null,"abstract":"Social networking system is not just for seeking and keeping customers but it has also proven to be a highly effective business tool. On the other hand, E-Tourism marketing and its technology cause the change of power balance between the industries and the service companies by providing better harmony between organizations, practical and easier method of production, less error in input and output data and the increasing accuracy, while causing complexity in programming and editing the approaches. There are many problems in integrated management of social networks. The majority of E-commerce models are based on traditional approaches without considering the electronic revolution of the recent decades. By using the analyze model of SWOT and by recognizing the fundamental properties of international e-tourism marketing, one can present some strategies to find a balance between the environment data and the digital data. In this paper, we propose some recommendations to improve the performance of E-tourism by using SWOT output results.","PeriodicalId":342597,"journal":{"name":"2011 International Conference on Computational Aspects of Social Networks (CASoN)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115967072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A complete operational architecture of alert correlation","authors":"Fatemeh Amiri, Hossein Gharaee, A. Enayati","doi":"10.1109/CASON.2011.6085952","DOIUrl":"https://doi.org/10.1109/CASON.2011.6085952","url":null,"abstract":"To defend against various attacks, many security systems such as intrusion detection systems are deployed into hosts and networks to better protect digital assets. However, there are well-known problems related to the current intrusion detection systems. To better understand security threats from various sources and take appropriate response, it is necessary to perform alert correlation. This paper proposes a general alert correlation architecture, including four important components: log management, alert correlation, incident response and knowledge base system. The focus is to describe most important operations in alert correlation component. The proposed architecture includes anomaly-based analysis in alert correlation component. Different techniques for alert correlation are reviewed and compared. This study proposes that a hybrid model of multiple techniques leads to better performance of alert correlation engine.","PeriodicalId":342597,"journal":{"name":"2011 International Conference on Computational Aspects of Social Networks (CASoN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121116144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social networking APIs for companies — An example of using the Facebook API for companies","authors":"Frank Muller, F. Thiesing","doi":"10.1109/CASON.2011.6085929","DOIUrl":"https://doi.org/10.1109/CASON.2011.6085929","url":null,"abstract":"The use and integration of social networks is becoming increasingly important to many companies. Such networks are used within a company not only to publish information, but also to recruit new customers. Of particular interest is the provision of a vehicle for direct, effective communication between the company and its customers. Most of the well-known social networks provide what are known as “Application Programming Interfaces” (APIs), which provide flexible tools to enhance and customize the use of the networking platform. We discuss the uses and possibilities of APIs using Facebook as an example.","PeriodicalId":342597,"journal":{"name":"2011 International Conference on Computational Aspects of Social Networks (CASoN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125964122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of an adjacent 3G network corruption influence on WLAN/3G interworking access","authors":"R. Fouladi, Somayeh Salimi, Hossein Gharaee","doi":"10.1109/CASON.2011.6085936","DOIUrl":"https://doi.org/10.1109/CASON.2011.6085936","url":null,"abstract":"In this article, we investigate the user access, i.e., the average number of times of a mobile user entrance, to a Wireless Local Area Network (WLAN) cell in a WLAN and third generation (3G) telecommunication coupled network when an attack causes harm to its adjacent network. The adjacent network is a 3G network. The considered attack is a removal attack that makes a 3G cell, in an adjacent network, disabled to support its services. To do the study, regular Markov chain model is applied. This study shows the dependency of user access to the structure of its adjacent network.","PeriodicalId":342597,"journal":{"name":"2011 International Conference on Computational Aspects of Social Networks (CASoN)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128076837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vanesa Junquero-Trabado, Nuria Trench-Ribes, Miquel Angel Aguila-Lorente, David Dominguez-Sal
{"title":"Comparison of influence metrics in information diffusion networks","authors":"Vanesa Junquero-Trabado, Nuria Trench-Ribes, Miquel Angel Aguila-Lorente, David Dominguez-Sal","doi":"10.1109/CASON.2011.6085914","DOIUrl":"https://doi.org/10.1109/CASON.2011.6085914","url":null,"abstract":"The importance of social networks has pushed the analysis of the interactions among their users. The fact that a user may influence their friends or the friends of their friends makes the study of these social interactions necessary for many disciplines. We design a flexible model that can be mapped to many social-like networks. Specifically, we study and compare three of these networks: Enron, Twitter and Scopus. We present a comparison of several variables of influence and how important they are in each network. In addition, we study how correlated they are and the depth of influence propagation. We observe that in general variables exhibit correlation between them but they are not strongly correlated when we study the most influencing users. Finally, the influence is not very deep in all cases which means that influence propagation is generally local.","PeriodicalId":342597,"journal":{"name":"2011 International Conference on Computational Aspects of Social Networks (CASoN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124062369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diego Blanco-Moreno, Rubén Fuentes-Fernández, J. Pavón
{"title":"Simulation of Online Social Networks with Krowdix","authors":"Diego Blanco-Moreno, Rubén Fuentes-Fernández, J. Pavón","doi":"10.1109/CASON.2011.6085911","DOIUrl":"https://doi.org/10.1109/CASON.2011.6085911","url":null,"abstract":"Online Social Networks (OSNs) are a key phenomenon of Internet. Simulations are widely used in their study as means to harness their size and complexity, and to overcome the difficulties to set up experiments in real environments. However, these tools are still limited. They are usually focused on the structure of relationships and emulate changes only from statistical data. This approach is unsuitable to study OSN evolution as a result of the personal attributes and behaviours of their members. Our work addresses this issue with an agent-based simulation framework for OSNs called Krowdix. It provides support to specify simulations of discrete time where agents represent members acting according to their profiles and context. This context comprehends the environment, other agents, groups of agents and the whole network. Agent actions are responsible of network changes. Additionally, system actions can be used to represent unexpected events. This agent-based approach facilitates the translation of actual observations to simulation models, and explaining networks in terms of their members. A case study on Facebook illustrates the use of the framework.","PeriodicalId":342597,"journal":{"name":"2011 International Conference on Computational Aspects of Social Networks (CASoN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132019894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining shared social media links to support clustering of blog articles","authors":"Darko Obradovic, Fernanda S. Pimenta, A. Dengel","doi":"10.1109/CASON.2011.6085940","DOIUrl":"https://doi.org/10.1109/CASON.2011.6085940","url":null,"abstract":"When monitoring blog articles for the tracking of a certain personality or product, the automatic identification of topic clusters is of high interest. Clustering by textual content is a popular method to accomplish this. In this paper we investigate how links between individual blog articles can be used to support this clustering with another dimension of information. Given the existing component structure of these networks, we focus on the extension with links based on shared social media resources. We show that the component structure extended in this way is of very high use for supporting textual clustering algorithms, and may be used for a new type of hybrid clustering algorithms in the future.","PeriodicalId":342597,"journal":{"name":"2011 International Conference on Computational Aspects of Social Networks (CASoN)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114343143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implicit groups in web-based interactive applications","authors":"Miguel Rangel Pais, C. Morgado, J. Cunha","doi":"10.1109/CASON.2011.6085939","DOIUrl":"https://doi.org/10.1109/CASON.2011.6085939","url":null,"abstract":"The information overload resulting from the growth of the Internet increases the need for efficient mechanisms to identify and manage information relevant for users and groups of users within web-based interactive applications. As users can be grouped according to shared interests, characteristics and interactions, groups form convenient structures to support the required personalization.","PeriodicalId":342597,"journal":{"name":"2011 International Conference on Computational Aspects of Social Networks (CASoN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130512881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}