{"title":"Influence modelling using bounded rationality in social networks","authors":"D. Kasthurirathna, M. Harré, Piraveenan Mahendra","doi":"10.1145/2808797.2808886","DOIUrl":"https://doi.org/10.1145/2808797.2808886","url":null,"abstract":"Influence models enable the modelling of the spread of ideas, opinions and behaviours in social networks. Bounded rationality in social network suggests that players make non optimum decisions due to the limitations of access to information. Based on the premise that adopting a state or an idea can be regarded as being `rational', we propose an influence model based on the heterogeneous bounded rationality of players in a social network. We employ the quantal response equilibrium model to incorporate the bounded rationality in the context of social influence. The bounded rationality of following a seed or adopting the strategy of a seed would be negatively proportional to the distance from that node. This indicates that the closeness centrality would be the appropriate measure to place influencers in a social network. We argue that this model can be used in scenarios where there are multiple types of influencers and varying payoffs of adopting a state. We compare different seed placement mechanisms to compare and contrast the optimum method to minimise the existing social influence in a network when there are multiple and conflicting seeds. We ascertain that placing of opposing seeds according to a measure derived from a combination of the betweenness centrality values from the seeds and the closeness centrality of the network would provide the maximum negative influence.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115656636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Raoufi, M. Hemmati, Hossein EinAbadi, H. Fallahi
{"title":"Predicting candidate epitopes on Ebolaviruse for possible vaccine development","authors":"E. Raoufi, M. Hemmati, Hossein EinAbadi, H. Fallahi","doi":"10.1145/2808797.2809370","DOIUrl":"https://doi.org/10.1145/2808797.2809370","url":null,"abstract":"Zaire ebolavirus a member of family Filoviridae is the cause of hemorrhagic fever. Due to lack of appropriate anti-viral or vaccine, this disease is very lethal. In this study we tried to find epitopes for superficial glycoprotein of Zaire ebolavirus (that have high antigenicity for MHC I, II and B cells) with use of in-silico methods and immunoinformatics approach. By use of CTLPred, SYFPEITHI and Propred web applications for MHC class I and SYFPEITHI and Propred1web applications for MHC class II we had been able to find epitopes (peptides) that have highest score. Also ElliPro, IgPred and Discotope web tools had been performed to predict B cells epitopes. The sequence \"SRFTPQFLL\" and \"IFFLYDRLAS\" were selected to be epitopes for MHCs molecules. The region 255 to 310 was selected for B cell epitope. It was expected these peptides could be stimulated immune response and used for designing multi-peptide vaccine against ZEV but these results should be reliable with experimental analysis.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121236814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing link dynamics in scientific collaboration networks ℄ A social yield based perspective","authors":"Arun Pandey, Roshni Chakraborty, Soumya Sarkar, Joydeep Chandra","doi":"10.1145/2808797.2808835","DOIUrl":"https://doi.org/10.1145/2808797.2808835","url":null,"abstract":"In this paper, we introduce social yield, a measure of collaboration success of the collaborating authors in a co-authorship network. We then attempt to empirically observe the link dynamics in collaboration networks induced by the social yield of the collaborations. Observation indicate that certain observed behavior like presence of large number of small sized communities and highly dynamic behavior of the links in collaboration networks can be explained based on the distribution of social yield of these collaborations. It is also observed that the distribution of social yield among the collaborations also affects the resilience of the collaboration networks to targeted link removal.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127257285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christian Brugger, A. Chinazzo, Alexandre Flores John, C. D. Schryver, N. Wehn, Andreas Spitz, K. Zweig
{"title":"Exploiting phase transitions for the efficient sampling of the fixed degree sequence model","authors":"Christian Brugger, A. Chinazzo, Alexandre Flores John, C. D. Schryver, N. Wehn, Andreas Spitz, K. Zweig","doi":"10.1145/2808797.2809388","DOIUrl":"https://doi.org/10.1145/2808797.2809388","url":null,"abstract":"Real-world network data is often very noisy and contains erroneous or missing edges. These superfluous and missing edges can be identified statistically by assessing the number of common neighbors of the two incident nodes. To evaluate whether this number of common neighbors, the so called co-occurrence, is statistically significant, a comparison with the expected co-occurrence in a suitable random graph model is required. For networks with a skewed degree distribution, including most real-world networks, it is known that the fixed degree sequence model, which maintains the degrees of nodes, is favourable over using simplified graph models that are based on an independence assumption. However, the use of a fixed degree sequence model requires sampling from the space of all graphs with the given degree sequence and measuring the co-occurrence of each pair of nodes in each of the samples, since there is no known closed formula for this statistic. While there exist log-linear approaches such as Markov chain Monte Carlo sampling, the computational complexity still depends on the length of the Markov chain and the number of samples, which is significant in large-scale networks. In this article, we show based on ground truth data that there are various phase transition-like tipping points that enable us to choose a comparatively low number of samples and to reduce the length of the Markov chains without reducing the quality of the significance test. As a result, the computational effort can be reduced by an order of magnitudes.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127381793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social networks with multiple relationship semantics","authors":"Q. Zheng","doi":"10.1145/2808797.2808818","DOIUrl":"https://doi.org/10.1145/2808797.2808818","url":null,"abstract":"Social networks consist of a set of participants and the pairwise relationships between them. There are several different types of networks, such as directed networks, networks with typed edges, dynamic networks and signed networks, as well as any composition of different types of networks. We develop a novel way to analyze such networks by considering the qualitatively different social roles that each individual can play in a network. For example, in a directed network, the participants have two social roles - an incoming edge role and an outgoing edge role which are associated with the popularity and activity of each individual. Each role or status and the corresponding connections define a subgraph. We model the subgraph as a layer, and show how to weight the edges connecting the layers to produce a consistent spectral embedding. This embedding can be used to compute social network properties of graphs of different types, to predict edges, edge types, and edge direction, as well as to track the change of role over time. We illustrate the approaches using synthetic and real-world datasets.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126125921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Ondrejka, Petr Šaloun, Jakub Stonawski, I. Zelinka
{"title":"Finding posts in digital libraries of authors with garbled names","authors":"A. Ondrejka, Petr Šaloun, Jakub Stonawski, I. Zelinka","doi":"10.1145/2808797.2809343","DOIUrl":"https://doi.org/10.1145/2808797.2809343","url":null,"abstract":"Authors with names containing characters outside the ASCII character set have often names garbled also in digital libraries. We solve this problem using professional social networks and digital libraries relations, links and metadata. To find publications we use simple analysis of connections of the author, his co-authors and affiliates and an approximate string matching algorithm for estimating whether the garbled name can be the right name or not. Experimental results are very promising based on real data in digital libraries such are IEEE Xplore, ACM DL and SpringerLink. Description and explanation of the method is contained, a case study was used for Czech and Slovak authors.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115565219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anh Dang, A. Mohammad, A. Gruzd, E. Milios, R. Minghim
{"title":"A visual framework for clustering memes in social media","authors":"Anh Dang, A. Mohammad, A. Gruzd, E. Milios, R. Minghim","doi":"10.1145/2808797.2808830","DOIUrl":"https://doi.org/10.1145/2808797.2808830","url":null,"abstract":"The spread of \"rumours\" in Online Social Networks (OSNs) has grown at an alarming rate. Consequently, there is an increasing need to improve understanding of the social and technological processes behind this trend. The first step in detecting rumours is to identify and extract memes, a unit of information that can be spread from person to person in OSNs. This paper proposes four similarity scores and two novel strategies to combine those similarity scores for detecting the spread of memes in OSNs, with the end goal of helping researchers as well as members of various OSNs to study the phenomenon. The two proposed strategies include: (1) automatically computing the similarity score weighting factors for four elements of a submission and (2) allowing users to engage in the clustering process and filter out outlier submissions, modify submission class labels, or assign different similarity score weight factors for various elements of a submission using a visualization prototype. To validate our approach, we collect submissions on Reddit about five controversial topics and demonstrate that the proposed strategies outperform the baseline.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114256335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Local rules associated to k-communities in an attributed graph","authors":"H. Soldano, G. Santini, Dominique Bouthinon","doi":"10.1145/2808797.2808893","DOIUrl":"https://doi.org/10.1145/2808797.2808893","url":null,"abstract":"We address the problem of finding local patterns and local rules in an attributed graph. A (global) closed pattern is the most specific attribute pattern shared by the vertices of the (possibly simplified) subgraph induced by some attribute pattern. A local closed pattern is the maximal attribute pattern associated to a particular dense region of this subgraph. As such local regions, we are in particular interested in k-communities of pattern subgraphs. In this case we show that there is a closure operator such that, given a pattern q subgraph and a k-community in this subgraph, returns the local closed pattern shared by all the members of the community. We then consider how to generate triples (c, e, l) where c is a (global) closed pattern whose subgraph contains e as a k-community, and l is the corresponding local closed pattern. This leads to implication rules expressing what new attributes are specific of the k-community e in the pattern c subgraph.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128296302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Management of duplicate members on websites","authors":"Kee-Young Kwahk, Eun-Young Kang","doi":"10.1145/2808797.2808815","DOIUrl":"https://doi.org/10.1145/2808797.2808815","url":null,"abstract":"On Web sites, individuals with duplicate memberships who dishonestly participate in a product's marketing activities unfairly receive prizes and accumulate points from a service in an abnormal manner. Individuals who have taken advantage of these deficiencies of Web sites have decreased the effectiveness of company's marketing activities by usurping the benefits that should have been provided to other members. This study presents a method of duplicate membership identification using network analysis.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128683363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling social network topology with variable social vector clocks","authors":"T. Hsu, A. Kshemkalyani","doi":"10.1145/2808797.2809405","DOIUrl":"https://doi.org/10.1145/2808797.2809405","url":null,"abstract":"Analyzing social network structures can provide an insight into the character of human interactions and communication mechanisms for solving a variety of social problems. By applying variable social vector clocks and involving weight evolution influence, we construct a coupled-weight and directed link generation algorithm for modeling a social topology in a closed social group. The degree and weight strength distributions of simulation topologies demonstrate the scale-free properties and effectiveness of weight diffusion in the real world.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129054276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}