2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)最新文献

筛选
英文 中文
Predicting Swedish elections with Twitter: A case for stochastic link structure analysis 用Twitter预测瑞典大选:一个随机链接结构分析的案例
Nima Dokoohaki, Filippia Zikou, D. Gillblad, M. Matskin
{"title":"Predicting Swedish elections with Twitter: A case for stochastic link structure analysis","authors":"Nima Dokoohaki, Filippia Zikou, D. Gillblad, M. Matskin","doi":"10.1145/2808797.2808915","DOIUrl":"https://doi.org/10.1145/2808797.2808915","url":null,"abstract":"The question that whether Twitter data can be leveraged to forecast outcome of the elections has always been of great anticipation in the research community. Existing research focuses on leveraging content analysis for positivity or negativity analysis of the sentiments of opinions expressed. This is while, analysis of link structure features of social networks underlying the conversation involving politicians has been less looked. The intuition behind such study comes from the fact that density of conversations about parties along with their respective members, whether explicit or implicit, should reflect on their popularity. On the other hand, dynamism of interactions, can capture the inherent shift in popularity of accounts of politicians. Within this manuscript we present evidence of how a well-known link prediction algorithm, can reveal an authoritative structural link formation within which the popularity of the political accounts along with their neighbourhoods, shows strong correlation with the standing of electoral outcomes. As an evidence, the public time-lines of two electoral events from 2014 elections of Sweden on Twitter have been studied. By distinguishing between member and official party accounts, we report that even using a focus-crawled public dataset, structural link popularities bear strong statistical similarities with vote outcomes. In addition we report strong ranked dependence between standings of selected politicians and general election outcome, as well as for official party accounts and European election outcome.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128810712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
An approach from statistical mechanics for collaborative business social network reconstruction 基于统计力学的协同商业社会网络重构方法
A. Corallo, C. Bisconti, Laura Fortunato, A. A. Gentile, Piergiuseppe Pellè
{"title":"An approach from statistical mechanics for collaborative business social network reconstruction","authors":"A. Corallo, C. Bisconti, Laura Fortunato, A. A. Gentile, Piergiuseppe Pellè","doi":"10.1145/2808797.2809377","DOIUrl":"https://doi.org/10.1145/2808797.2809377","url":null,"abstract":"The role of human resources has become a key factor for the success of an organization. Based on a research collaboration with an aeronautical company, the paper proposes a comparison of two different approaches for the reconstruction of a collaborative social network in the business realm: the use of traditional Social Network Analysis and novel statistical inference models. Both approaches were evaluated against data provided by the company, in order to scout the key people in the network and the knowledge-transfer processes. As a main outcome of this paper, it was found how the network reconstruction using statistical models has an increased robustness, as well as sensitivity, allowing to discover hidden correlations among the users.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128847786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On mining lifestyles from user trip data 从用户出行数据中挖掘生活方式
Meng-Fen Chiang, Ee-Peng Lim, Jia-Wei Low
{"title":"On mining lifestyles from user trip data","authors":"Meng-Fen Chiang, Ee-Peng Lim, Jia-Wei Low","doi":"10.1145/2808797.2808906","DOIUrl":"https://doi.org/10.1145/2808797.2808906","url":null,"abstract":"Large cities today are facing major challenges in planning and policy formulation to keep their growth sustainable. In this paper, we aim to gain useful insights about people living in a city by developing novel models to mine user lifestyles represented by the users' activity centers. Two models, namely ACMM and ACHMM, have been developed to learn the activity centers of each user using a large dataset of bus and subway train trips performed by passengers in Singapore. We show that ACHMM and ACMM yield similar accuracies in location prediction task. We also propose methods to automatically predict \"home\", \"work\" and \"others\" labels of locations visited by each user. Through validating with human-labeled home and work locations, we show that the accuracy of location label assignment is surprisingly very good even using an unsupervised method. With the location labels assigned, we further derive interesting insights of urban lifestyles at both individual and population levels.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125514284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Social influence computation and maximization in signed networks with competing cascades 具有竞争级联的签名网络中的社会影响计算与最大化
Ajitesh Srivastava, C. Chelmis, V. Prasanna
{"title":"Social influence computation and maximization in signed networks with competing cascades","authors":"Ajitesh Srivastava, C. Chelmis, V. Prasanna","doi":"10.1145/2808797.2809304","DOIUrl":"https://doi.org/10.1145/2808797.2809304","url":null,"abstract":"Often in marketing, political campaigns and social media, two competing products or opinions propagate over a social network. Studying social influence in such competing cascades scenarios enables building effective strategies for maximizing the propagation of one process by targeting the most \"influential\" nodes in the network. The majority of prior work however, focuses on unsigned networks where individuals adopt the opinion of their neighbors with certain probability. In real life, relationships between individuals can be positive (e.g., friend-of relationship) or negative (e.g. connection between \"foes\"). According to social theory, people tend to have similar opinions to their friends but opposite of their foes. In this work, we study the problem of competing cascades on signed networks, which has been relatively unexplored. Particularly, we study the progressive propagation of two competing cascades in a signed network under the Independent Cascade Model, and provide an approximate analytical solution to compute the probability of infection of a node at any given time. We leverage our analytical solution to the problem of competing cascades in signed networks to develop a heuristic for the influence maximization problem. Unlike prior work, we allow the seed-set to be initialized with populations of both cascades with the end goal of maximizing the spread of one cascade. We validate our approach on several large-scale real-world and synthetic networks. Our experiments demonstrate that our influence maximization heuristic significantly outperforms state-of-the-art methods, particularly when the network is dominated by distrust relationships.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126649278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Trend detection in social networks using Hawkes processes 使用Hawkes过程的社交网络趋势检测
Julio Cesar Louzada Pinto, T. Chahed, E. Altman
{"title":"Trend detection in social networks using Hawkes processes","authors":"Julio Cesar Louzada Pinto, T. Chahed, E. Altman","doi":"10.1145/2808797.2814178","DOIUrl":"https://doi.org/10.1145/2808797.2814178","url":null,"abstract":"We develop in this paper a trend detection algorithm, designed to find trendy topics being disseminated in a social network. We assume that the broadcasts of messages in the social network is governed by a self-exciting point process, namely a Hawkes process, which takes into consideration the real broadcasting times of messages and the interaction between users and topics. We formally define trendiness and derive trend indices for each topic being disseminated in the social network. These indices take into consideration the time between the detection and the message broadcasts, the distance between the real broadcast intensity and the maximum expected broadcast intensity, and the social network topology. The proposed trend detection algorithm is simple and uses stochastic control techniques in order to calculate the trend indices. It is also fast and aggregates all the information of the broadcasts into a simple one-dimensional process, thus reducing its complexity and the quantity of data necessary to the detection.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126649718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks 黑客拓扑物质地理:映射重复系统入侵事件网络的动态
Amit Rechavi, Tamar Berenblum, David Maimon, Ido Sivan Sevilla
{"title":"Hackers topology matter geography: Mapping the dynamics of repeated system trespassing events networks","authors":"Amit Rechavi, Tamar Berenblum, David Maimon, Ido Sivan Sevilla","doi":"10.1145/2808797.2808873","DOIUrl":"https://doi.org/10.1145/2808797.2808873","url":null,"abstract":"This study focuses on the spatial context of hacking to networks of Honey-pots. We investigate the relationship between topological positions and geographic positions of victimized computers and system trespassers. We've deployed research Honeypots on the computer networks of two academic institutions, collected information on successful brute force attacks (BFA) and system trespassing events (sessions), and used Social Network Analysis (SNA) techniques, to depict and understand the correlation between spatial attributes (IP addresses) and hacking networks' topology. We mapped and explored hacking patterns and found that geography might set the behavior of the attackers as well as the topology of hacking networks. The contribution of this study stems from the fact that there are no prior studies of geographical influences on the topology of hacking networks and from the unique usage of SNA to investigate hacking activities. Looking ahead, our study can assist policymakers in forming effective policies in the field of cybercrime.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123236850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Email conversation network analysis: Work groups and teams in organizations 电子邮件会话网络分析:组织中的工作组和团队
S. Zehnalova, Z. Horak, M. Kudelka
{"title":"Email conversation network analysis: Work groups and teams in organizations","authors":"S. Zehnalova, Z. Horak, M. Kudelka","doi":"10.1145/2808797.2808862","DOIUrl":"https://doi.org/10.1145/2808797.2808862","url":null,"abstract":"Email communication is a source of important information, much of which is at first sight hidden. This paper presents an analytical tool that was created to analyze the deeper relationships in the email data. Those include relationships based on an interaction of multiple users in a team. The analytical methods proposed and described in this paper are based on two factors. The first factor is the context, which is a group of multiple users in combination with terms used in the communication. The second factor is the time interval in which the communication was conducted. Based on these factors, we analyze the conversations that take place and get results that are in several different forms presented to the users. The paper presents methods for weighting conversations, users and relationships, as well as methods for finding communities associated with the specified context. Additionally, the concept of the explorative user interface is introduced.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126448191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Is normalized mutual information a fair measure for comparing community detection methods? 标准化的互信息是比较社区检测方法的公平衡量标准吗?
Alessia Amelio, C. Pizzuti
{"title":"Is normalized mutual information a fair measure for comparing community detection methods?","authors":"Alessia Amelio, C. Pizzuti","doi":"10.1145/2808797.2809344","DOIUrl":"https://doi.org/10.1145/2808797.2809344","url":null,"abstract":"Normalized mutual information (NMI) is a widely used measure to compare community detection methods. Recently, however, the need of adjustment for information theoretic based measures has been argued because of their tendency in choosing clustering solutions with more communities. In this paper an experimental evaluation is performed to investigate this problem, and an adjustment that scales the values of NMI is proposed. Experiments on synthetic generated networks highlight the unbiased behavior of scaled NMI.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122237544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
Bipartite network model for inferring hidden ties in crime data 犯罪数据中隐含联系的二部网络模型
Haruna Isah, D. Neagu, P. Trundle
{"title":"Bipartite network model for inferring hidden ties in crime data","authors":"Haruna Isah, D. Neagu, P. Trundle","doi":"10.1145/2808797.2808842","DOIUrl":"https://doi.org/10.1145/2808797.2808842","url":null,"abstract":"Certain crimes are difficult to be committed by individuals but carefully organised by group of associates and affiliates loosely connected to each other with a single or small group of individuals coordinating the overall actions. A common starting point in understanding the structural organisation of criminal groups is to identify the criminals and their associates. Situations arise in many criminal datasets where there is no direct connection among the criminals. In this paper, we investigate ties and community structure in crime data in order to understand the operations of both traditional and cyber criminals, as well as to predict the existence of organised criminal networks. Our contributions are twofold: we propose a bipartite network model for inferring hidden ties between actors who initiated an illegal interaction and objects affected by the interaction, we then validate the method in two case studies on pharmaceutical crime and underground forum data using standard network algorithms for structural and community analysis. The vertex level metrics and community analysis results obtained indicate the significance of our work in understanding the operations and structure of organised criminal networks which were not immediately obvious in the data. Identifying these groups and mapping their relationship to one another is essential in making more effective disruption strategies in the future.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124978091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Topological resilience analysis of supply networks under random disruptions and targeted attacks 随机中断和目标攻击下供应网络拓扑弹性分析
Wenjun Wang, W. Street, Renato E. deMatta
{"title":"Topological resilience analysis of supply networks under random disruptions and targeted attacks","authors":"Wenjun Wang, W. Street, Renato E. deMatta","doi":"10.1145/2808797.2809325","DOIUrl":"https://doi.org/10.1145/2808797.2809325","url":null,"abstract":"Along with the rapid advancement of information technology, the traditional hierarchical supply chain has been quickly evolving into a variety of supply networks, which usually incorporate a large number of entities into complex graph topologies. The study of the resilience of supply networks is an important challenge. In this paper, we exploit the resilience embedded in the network topology by investigating in depth the multiple-path reachability of each demand node to other nodes, and propose a novel network resilience metric. We also develop new supply-network growth mechanisms that reflect the heterogeneous roles of different types of nodes in the supply network. We incorporate them into two fundamental network topologies (i.e. random-graph network and scale-free network), and evaluate their resilience against both random disruptions and targeted attacks using the new resilience metric. The experimental results verify the validity of our resilience metric and the effectiveness of our growth model. This research provides a generic framework and important insights into the construction and resilience analysis of complex supply networks.","PeriodicalId":371988,"journal":{"name":"2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127728301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信