2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)最新文献

筛选
英文 中文
Influence modelling using bounded rationality in social networks 在社会网络中使用有限理性的影响建模
D. Kasthurirathna, M. Harré, Piraveenan Mahendra
{"title":"Influence modelling using bounded rationality in social networks","authors":"D. Kasthurirathna, M. Harré, Piraveenan Mahendra","doi":"10.1145/2808797.2808886","DOIUrl":"https://doi.org/10.1145/2808797.2808886","url":null,"abstract":"Influence models enable the modelling of the spread of ideas, opinions and behaviours in social networks. Bounded rationality in social network suggests that players make non optimum decisions due to the limitations of access to information. Based on the premise that adopting a state or an idea can be regarded as being `rational', we propose an influence model based on the heterogeneous bounded rationality of players in a social network. We employ the quantal response equilibrium model to incorporate the bounded rationality in the context of social influence. The bounded rationality of following a seed or adopting the strategy of a seed would be negatively proportional to the distance from that node. This indicates that the closeness centrality would be the appropriate measure to place influencers in a social network. We argue that this model can be used in scenarios where there are multiple types of influencers and varying payoffs of adopting a state. We compare different seed placement mechanisms to compare and contrast the optimum method to minimise the existing social influence in a network when there are multiple and conflicting seeds. We ascertain that placing of opposing seeds according to a measure derived from a combination of the betweenness centrality values from the seeds and the closeness centrality of the network would provide the maximum negative influence.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115656636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Predicting candidate epitopes on Ebolaviruse for possible vaccine development 预测埃博拉病毒候选表位,用于可能的疫苗开发
E. Raoufi, M. Hemmati, Hossein EinAbadi, H. Fallahi
{"title":"Predicting candidate epitopes on Ebolaviruse for possible vaccine development","authors":"E. Raoufi, M. Hemmati, Hossein EinAbadi, H. Fallahi","doi":"10.1145/2808797.2809370","DOIUrl":"https://doi.org/10.1145/2808797.2809370","url":null,"abstract":"Zaire ebolavirus a member of family Filoviridae is the cause of hemorrhagic fever. Due to lack of appropriate anti-viral or vaccine, this disease is very lethal. In this study we tried to find epitopes for superficial glycoprotein of Zaire ebolavirus (that have high antigenicity for MHC I, II and B cells) with use of in-silico methods and immunoinformatics approach. By use of CTLPred, SYFPEITHI and Propred web applications for MHC class I and SYFPEITHI and Propred1web applications for MHC class II we had been able to find epitopes (peptides) that have highest score. Also ElliPro, IgPred and Discotope web tools had been performed to predict B cells epitopes. The sequence \"SRFTPQFLL\" and \"IFFLYDRLAS\" were selected to be epitopes for MHCs molecules. The region 255 to 310 was selected for B cell epitope. It was expected these peptides could be stimulated immune response and used for designing multi-peptide vaccine against ZEV but these results should be reliable with experimental analysis.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121236814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analyzing link dynamics in scientific collaboration networks ℄ A social yield based perspective 科学协作网络中的链接动态分析℄基于社会收益的视角
Arun Pandey, Roshni Chakraborty, Soumya Sarkar, Joydeep Chandra
{"title":"Analyzing link dynamics in scientific collaboration networks ℄ A social yield based perspective","authors":"Arun Pandey, Roshni Chakraborty, Soumya Sarkar, Joydeep Chandra","doi":"10.1145/2808797.2808835","DOIUrl":"https://doi.org/10.1145/2808797.2808835","url":null,"abstract":"In this paper, we introduce social yield, a measure of collaboration success of the collaborating authors in a co-authorship network. We then attempt to empirically observe the link dynamics in collaboration networks induced by the social yield of the collaborations. Observation indicate that certain observed behavior like presence of large number of small sized communities and highly dynamic behavior of the links in collaboration networks can be explained based on the distribution of social yield of these collaborations. It is also observed that the distribution of social yield among the collaborations also affects the resilience of the collaboration networks to targeted link removal.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127257285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exploiting phase transitions for the efficient sampling of the fixed degree sequence model 利用相变对定度序列模型进行有效采样
Christian Brugger, A. Chinazzo, Alexandre Flores John, C. D. Schryver, N. Wehn, Andreas Spitz, K. Zweig
{"title":"Exploiting phase transitions for the efficient sampling of the fixed degree sequence model","authors":"Christian Brugger, A. Chinazzo, Alexandre Flores John, C. D. Schryver, N. Wehn, Andreas Spitz, K. Zweig","doi":"10.1145/2808797.2809388","DOIUrl":"https://doi.org/10.1145/2808797.2809388","url":null,"abstract":"Real-world network data is often very noisy and contains erroneous or missing edges. These superfluous and missing edges can be identified statistically by assessing the number of common neighbors of the two incident nodes. To evaluate whether this number of common neighbors, the so called co-occurrence, is statistically significant, a comparison with the expected co-occurrence in a suitable random graph model is required. For networks with a skewed degree distribution, including most real-world networks, it is known that the fixed degree sequence model, which maintains the degrees of nodes, is favourable over using simplified graph models that are based on an independence assumption. However, the use of a fixed degree sequence model requires sampling from the space of all graphs with the given degree sequence and measuring the co-occurrence of each pair of nodes in each of the samples, since there is no known closed formula for this statistic. While there exist log-linear approaches such as Markov chain Monte Carlo sampling, the computational complexity still depends on the length of the Markov chain and the number of samples, which is significant in large-scale networks. In this article, we show based on ground truth data that there are various phase transition-like tipping points that enable us to choose a comparatively low number of samples and to reduce the length of the Markov chains without reducing the quality of the significance test. As a result, the computational effort can be reduced by an order of magnitudes.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127381793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Social networks with multiple relationship semantics 具有多重关系语义的社会网络
Q. Zheng
{"title":"Social networks with multiple relationship semantics","authors":"Q. Zheng","doi":"10.1145/2808797.2808818","DOIUrl":"https://doi.org/10.1145/2808797.2808818","url":null,"abstract":"Social networks consist of a set of participants and the pairwise relationships between them. There are several different types of networks, such as directed networks, networks with typed edges, dynamic networks and signed networks, as well as any composition of different types of networks. We develop a novel way to analyze such networks by considering the qualitatively different social roles that each individual can play in a network. For example, in a directed network, the participants have two social roles - an incoming edge role and an outgoing edge role which are associated with the popularity and activity of each individual. Each role or status and the corresponding connections define a subgraph. We model the subgraph as a layer, and show how to weight the edges connecting the layers to produce a consistent spectral embedding. This embedding can be used to compute social network properties of graphs of different types, to predict edges, edge types, and edge direction, as well as to track the change of role over time. We illustrate the approaches using synthetic and real-world datasets.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126125921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding posts in digital libraries of authors with garbled names 在数字图书馆中查找名字乱码的作者的帖子
A. Ondrejka, Petr Šaloun, Jakub Stonawski, I. Zelinka
{"title":"Finding posts in digital libraries of authors with garbled names","authors":"A. Ondrejka, Petr Šaloun, Jakub Stonawski, I. Zelinka","doi":"10.1145/2808797.2809343","DOIUrl":"https://doi.org/10.1145/2808797.2809343","url":null,"abstract":"Authors with names containing characters outside the ASCII character set have often names garbled also in digital libraries. We solve this problem using professional social networks and digital libraries relations, links and metadata. To find publications we use simple analysis of connections of the author, his co-authors and affiliates and an approximate string matching algorithm for estimating whether the garbled name can be the right name or not. Experimental results are very promising based on real data in digital libraries such are IEEE Xplore, ACM DL and SpringerLink. Description and explanation of the method is contained, a case study was used for Czech and Slovak authors.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115565219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A visual framework for clustering memes in social media 社交媒体中聚类模因的视觉框架
Anh Dang, A. Mohammad, A. Gruzd, E. Milios, R. Minghim
{"title":"A visual framework for clustering memes in social media","authors":"Anh Dang, A. Mohammad, A. Gruzd, E. Milios, R. Minghim","doi":"10.1145/2808797.2808830","DOIUrl":"https://doi.org/10.1145/2808797.2808830","url":null,"abstract":"The spread of \"rumours\" in Online Social Networks (OSNs) has grown at an alarming rate. Consequently, there is an increasing need to improve understanding of the social and technological processes behind this trend. The first step in detecting rumours is to identify and extract memes, a unit of information that can be spread from person to person in OSNs. This paper proposes four similarity scores and two novel strategies to combine those similarity scores for detecting the spread of memes in OSNs, with the end goal of helping researchers as well as members of various OSNs to study the phenomenon. The two proposed strategies include: (1) automatically computing the similarity score weighting factors for four elements of a submission and (2) allowing users to engage in the clustering process and filter out outlier submissions, modify submission class labels, or assign different similarity score weight factors for various elements of a submission using a visualization prototype. To validate our approach, we collect submissions on Reddit about five controversial topics and demonstrate that the proposed strategies outperform the baseline.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114256335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Local rules associated to k-communities in an attributed graph 属性图中与k- community相关的局部规则
H. Soldano, G. Santini, Dominique Bouthinon
{"title":"Local rules associated to k-communities in an attributed graph","authors":"H. Soldano, G. Santini, Dominique Bouthinon","doi":"10.1145/2808797.2808893","DOIUrl":"https://doi.org/10.1145/2808797.2808893","url":null,"abstract":"We address the problem of finding local patterns and local rules in an attributed graph. A (global) closed pattern is the most specific attribute pattern shared by the vertices of the (possibly simplified) subgraph induced by some attribute pattern. A local closed pattern is the maximal attribute pattern associated to a particular dense region of this subgraph. As such local regions, we are in particular interested in k-communities of pattern subgraphs. In this case we show that there is a closure operator such that, given a pattern q subgraph and a k-community in this subgraph, returns the local closed pattern shared by all the members of the community. We then consider how to generate triples (c, e, l) where c is a (global) closed pattern whose subgraph contains e as a k-community, and l is the corresponding local closed pattern. This leads to implication rules expressing what new attributes are specific of the k-community e in the pattern c subgraph.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128296302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Management of duplicate members on websites 管理网站上的重复成员
Kee-Young Kwahk, Eun-Young Kang
{"title":"Management of duplicate members on websites","authors":"Kee-Young Kwahk, Eun-Young Kang","doi":"10.1145/2808797.2808815","DOIUrl":"https://doi.org/10.1145/2808797.2808815","url":null,"abstract":"On Web sites, individuals with duplicate memberships who dishonestly participate in a product's marketing activities unfairly receive prizes and accumulate points from a service in an abnormal manner. Individuals who have taken advantage of these deficiencies of Web sites have decreased the effectiveness of company's marketing activities by usurping the benefits that should have been provided to other members. This study presents a method of duplicate membership identification using network analysis.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128683363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling social network topology with variable social vector clocks 用可变社会矢量时钟建模社会网络拓扑
T. Hsu, A. Kshemkalyani
{"title":"Modeling social network topology with variable social vector clocks","authors":"T. Hsu, A. Kshemkalyani","doi":"10.1145/2808797.2809405","DOIUrl":"https://doi.org/10.1145/2808797.2809405","url":null,"abstract":"Analyzing social network structures can provide an insight into the character of human interactions and communication mechanisms for solving a variety of social problems. By applying variable social vector clocks and involving weight evolution influence, we construct a coupled-weight and directed link generation algorithm for modeling a social topology in a closed social group. The degree and weight strength distributions of simulation topologies demonstrate the scale-free properties and effectiveness of weight diffusion in the real world.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129054276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信