Abstract is missing.
- Tutorial: Identifying Malicious Actors on Social MediaSrijan Kumar, Francesca Spezzano, V. S. Subrahmanian. [doi]
- Tutorial: Evolutionary Computation for Community Detection in Complex NetworksClara Pizzuti. [doi]
- Tutorial: Introduction to Social Media Network Analysis with NodeXLMarc A. Smith, Harald Meier. [doi]
- ASONAM 2016 keynotes: Ideas and inventionsBrian Uzzi, Lise Getoor, Evimaria Terzi, Lada A. Adamic. [doi]
- ASONAM 2016 panel: Social network analysis for social goodV. S. Subrahmanian, Lada A. Adamic, Lise Getoor, Evimaria Terzi, Brian Uzzi, Lisa Singh. [doi]
- Influence based analysis of community consistency in dynamic networksXiaowei Jia, Xiaoyi Li, Nan Du, Yuan Zhang, Vishrawas Gopalakrishnan, Guangxu Xun, Aidong Zhang. 1-8 [doi]
- Stop Clickbait: Detecting and preventing clickbaits in online news mediaAbhijnan Chakraborty, Bhargavi Paranjape, Sourya Kakarla, Niloy Ganguly. 9-16 [doi]
- Streaming METIS partitioningGhizlane Echbarthi, Hamamache Kheddouci. 17-24 [doi]
- New stopping criteria for spectral partitioningJames P. Fairbanks, Anita Zakrzewska, David A. Bader. 25-32 [doi]
- Local triangle-densest subgraphsRaman Samusevich, Maximilien Danisch, Mauro Sozio. 33-40 [doi]
- Tradeoffs between density and size in extracting dense subgraphs: A unified frameworkZhefeng Wang, Lingyang Chu, Jian Pei, Abdullah Al-Barakati, Enhong Chen. 41-48 [doi]
- Non-sharing communities? An empirical study of community detection for access control decisionsGaurav Misra, Jose M. Such, Hamed Balogun. 49-56 [doi]
- Functional cluster extraction from large spatial networksTakayasu Fushimi, Kazumi Saito, Tetsuo Ikeda, Kazuhiro Kazama. 57-62 [doi]
- Network completion via joint node clustering and similarity learningDimitrios Rafailidis, Fabio Crestani. 63-68 [doi]
- Sensitivity and reliability in incomplete networks: Centrality metrics to community scoring functionsSoumya Sarkar, Suhansanu Kumar, Sanjukta Bhowmick, Animesh Mukherjee. 69-72 [doi]
- Ensemble-based algorithms to detect disjoint and overlapping communities in networksTanmoy Chakraborty 0002, Noseong Park, V. S. Subrahmanian. 73-80 [doi]
- Community detection in political Twitter networks using Nonnegative Matrix Factorization methodsMert Ozer, Nyunsu Kim, Hasan Davulcu. 81-88 [doi]
- On predicting social unrest using social mediaRostyslav Korolov, Di Lu, Jingjing Wang, Guangyu Zhou, Claire Bonial, Clare R. Voss, Lance R. Kaplan, William A. Wallace, Jiawei Han, Heng Ji. 89-95 [doi]
- Characterizing communal microblogs during disaster eventsKoustav Rudra, Ashish Sharma, Niloy Ganguly, Saptarshi Ghosh. 96-99 [doi]
- Investigating the complete corpus of referendum and elections tweetsDespoina Antonakaki, Dimitris Spiliotopoulos, Christos V. Samaras, Sotiris Ioannidis, Paraskevi Fragopoulou. 100-105 [doi]
- Understanding citizen reactions and Ebola-related information propagation on social mediaThanh Tran, Kyumin Lee. 106-111 [doi]
- Estimating exponential random graph models using sampled network data via graphonRan He, Tian Zheng. 112-119 [doi]
- Rank degree: An efficient algorithm for graph samplingElli Voudigari, Nikos Salamanos, Theodore Papageorgiou, Emmanuel J. Yannakoudakis. 120-129 [doi]
- Query-friendly compression of graph streamsArijit Khan, Charu C. Aggarwal. 130-137 [doi]
- Classification in dynamic streaming networksYibo Yao, Lawrence B. Holder. 138-145 [doi]
- Social network dominance based on analysis of asymmetryYuemeng Li, Xintao Wu, Song Yang. 146-151 [doi]
- MaxReach: Reducing network incompleteness through node probesSucheta Soundarajan, Tina Eliassi-Rad, Brian Gallagher, Ali Pinar. 152-157 [doi]
- Predicting anchor links between heterogeneous social networksSina Sajadmanesh, Hamid R. Rabiee, Ali Khodadadi. 158-163 [doi]
- Benchmarking online social networksPablo Nicolas Terevinto, Miguel Perez, Josep Domènech, José A. Gil, Ana Pont. 164-169 [doi]
- On the δ-Hyperbolicity in complex networksHend Alrasheed. 170-173 [doi]
- Why not scale free? Simulating company ego networks on TwitterYoav Achiam, Inbal Yahav, David G. Schwartz. 174-177 [doi]
- Joining user profiles across online social networks: From the perspective of an adversaryQiang Ma, Han Hee Song, S. Muthukrishnan, Antonio Nucci. 178-185 [doi]
- Prediction of cyberbullying incidents in a media-based social networkHoma Hosseinmardi, Rahat Ibn Rafiq, Richard Han, Qin Lv, Shivakant Mishra. 186-192 [doi]
- Hiding in plain sight: Characterizing and detecting malicious Facebook pagesPrateek Dewan, Shrey Bagroy, Ponnurangam Kumaraguru. 193-196 [doi]
- Detecting malicious campaigns in crowdsourcing platformsHongkyu Choi, Kyumin Lee, Steve Webb. 197-202 [doi]
- Trust and privacy correlations in social networks: A deep learning frameworkShatha Jaradat, Nima Dokoohaki, Mihhail Matskin, Elena Ferrari. 203-206 [doi]
- NimbleCore: A space-efficient external memory algorithm for estimating core numbersPriya Govindan, Sucheta Soundarajan, Tina Eliassi-Rad, Christos Faloutsos. 207-214 [doi]
- All-pairs shortest distances maintenance in relational DBMSsSergio Greco, Cristian Molinaro, Chiara Pulice, Ximena Quintana. 215-222 [doi]
- Togetherness: An algorithmic approach to network integrationAnastasia Moskvina, Jiamou Liu. 223-230 [doi]
- On the guarantee of containment probability in influence minimizationChien-Wei Chang, Mi-Yen Yeh, Kun-Ta Chuang. 231-238 [doi]
- Intertwined viral marketing in social networksJiawei Zhang, Senzhang Wang, Qianyi Zhan, Philip S. Yu. 239-246 [doi]
- Analyzing information sharing strategies of users in online social networksDong-Anh Nguyen, Shulong Tan, Ram Ramanathan, Xifeng Yan. 247-254 [doi]
- Learning cascaded influence under partial monitoringJie Zhang, Jiaqi Ma, Jie Tang. 255-262 [doi]
- Community-based delurking in social networksRoberto Interdonato, Chiara Pulice, Andrea Tagarelli. 263-270 [doi]
- Percimo: A personalized community model for location estimation in social mediaGuangchao Yuan, Pradeep K. Murukannaiah, Munindar P. Singh. 271-278 [doi]
- Community-based geospatial tag estimationWei Niu, James Caverlee, Haokai Lu, Krishna Yeswanth Kamath. 279-286 [doi]
- Exploiting spatial-temporal-social constraints for localness inference using online social mediaChao Huang, Dong Wang. 287-294 [doi]
- Co-location social networks: Linking the physical world and cyberspaceHuandong Wang, Yong Li, Yang Chen, Yue Wang, Jian Yuan, Depeng Jin. 295-298 [doi]
- Network classification using adjacency matrix embeddings and deep learningKe Wu, Philip Watters, Malik Magdon-Ismail. 299-306 [doi]
- Weakly hierarchical lasso based learning to rank in best answer predictionQiongjie Tian, Baoxin Li. 307-314 [doi]
- Priority rank model for social network generationMikolaj Morzy, Przemyslaw Kazienko, Tomasz Kajdanowicz. 315-318 [doi]
- An information theoretic approach to generalised blockmodelling for the identification of meso-scale structure in networksNeil J. Hurley, Erika Duriakova. 319-322 [doi]
- Bayesian model selection of stochastic block modelsXiaoran Yan. 323-328 [doi]
- Dynamic community detection based on distance dynamicsQian Guo, Lei Zhang, Bin Wu, Xuelin Zeng. 329-336 [doi]
- Enumerating maximal cliques in temporal graphsAnne-Sophie Himmel, Hendrik Molter, Rolf Niedermeier, Manuel Sorge. 337-344 [doi]
- Structural measures of clustering quality on graph samplesJianpeng Zhang, Yulong Pei, George H. L. Fletcher, Mykola Pechenizkiy. 345-348 [doi]
- A local measure of community change in dynamic graphsAnita Zakrzewska, Eisha Nathan, James P. Fairbanks, David A. Bader. 349-353 [doi]
- A parameter-free method for detecting local communities based on attainable informationArdavan Afshar, Mansour Zolghadri Jahromi, Ali Hamzeh. 354-357 [doi]
- Web user profiling using data redundancyXiaotao Gu, Hong Yang, Jie Tang, Jing Zhang. 358-365 [doi]
- Can i foresee the success of my meetup group?Soumajit Pramanik, Midhun Gundapuneni, Sayan D. Pathak, Bivas Mitra. 366-373 [doi]
- Subconscious Crowdsourcing: A feasible data collection mechanism for mental disorder detection on social mediaChun-Hao Chang, Elvis Saravia, Yi-Shin Chen. 374-379 [doi]
- An analysis of student behavior in two massive open online coursesJames Schaffer, Brandon Huynh, John O'Donovan, Tobias Höllerer, Yinglong Xia, W. Sabrina Lin. 380-385 [doi]
- Personality homophily and the local network characteristics of facebookNyala Noë, Roger M. Whitaker, Stuart M. Allen. 386-393 [doi]
- Downside management in recommender systemsHuan Gui, Haishan Liu, Xiangrui Meng, Anmol Bhasin, Jiawei Han. 394-401 [doi]
- Collaborative restricted Boltzmann machine for social event recommendationXiaowei Jia, Xiaoyi Li, Kang Li, Vishrawas Gopalakrishnan, Guangxu Xun, Aidong Zhang. 402-405 [doi]
- Twitter message recommendation based on user interest profilesRaheleh Makki, Axel J. Soto, Stephen Brooks, Evangelos E. Milios. 406-410 [doi]
- Generating risk reduction recommendations to decrease vulnerability of public online profilesJanet Zhu, Sicong Zhang, Lisa Singh, Grace Hui Yang, Micah Sherr. 411-416 [doi]
- Exploring influence among participants for event recommendationYi Liao, Xinshi Lin, Wai Lam. 417-420 [doi]
- From migration corridors to clusters: The value of Google+ data for migration studiesJohnnatan Messias, Fabrício Benevenuto, Ingmar Weber, Emilio Zagheni. 421-428 [doi]
- How fashionable is each street?: Quantifying road characteristics using social mediaTakuya Nishimura, Kyosuke Nishida, Hiroyuki Toda, Hiroshi Sawada. 429-436 [doi]
- From event detection to storytelling on microblogsJanani Kalyanam, Sumithra Velupillai, Mike Conway, Gert R. G. Lanckriet. 437-442 [doi]
- Authorship identification in Bengali language: A graph based approachTanmoy Chakraborty 0002, Prasenjit Choudhury. 443-446 [doi]
- Finding needles of interested tweets in the haystack of Twitter networkQiongjie Tian, Jashmi Lagisetty, Baoxin Li. 447-452 [doi]
- Social badge system analysisJiawei Zhang, Xiangnan Kong, Philip S. Yu. 453-460 [doi]
- A first look at user activity on tinderGareth Tyson, Vasile Claudiu Perta, Hamed Haddadi, Michael C. Seto. 461-466 [doi]
- New to online dating? Learning from experienced users for a successful matchMo Yu, Xiaolong Zhang, Derek Kreager. 467-470 [doi]
- Dynamics of large scale networks following a mergerJohn Clements, Babak Farzad, Henryk Fuks. 471-476 [doi]
- The collapse of the Friendster network started from the center of the coreKazunori Seki, Masataka Nakamura. 477-484 [doi]
- Targeting algorithms for online social advertising marketsChaolun Xia, Saikat Guha, S. Muthukrishnan. 485-492 [doi]
- Correlations of consumption patterns in social-economic networksYannick Leo, Márton Karsai, Carlos Sarraute, Eric Fleury. 493-500 [doi]
- Analysis of rewards on reward-based crowdfunding platformsYusan Lin, Wang-Chien Lee, Chung-Chou H. Chang. 501-504 [doi]
- Heuristics for advertising revenue optimization in Online Social NetworksInzamam Rahaman, Patrick Hosein. 505-509 [doi]
- Emotion -and area-driven topic shift analysis in social media discussionsKamil Topal, Mehmet Koyutürk, Gultekin Özsoyoglu. 510-518 [doi]
- What we write about when we write about causality: Features of causal statements across large-scale social discourseThomas C. McAndrew, Joshua Clifford Bongard, Christopher M. Danforth, Peter Sheridan Dodds, Paul D. H. Hines, James P. Bagrow. 519-524 [doi]
- Core-periphery clustering and collaboration networksPierluigi Crescenzi, Pierre Fraigniaud, Zvi Lotker, Paolo Penna. 525-528 [doi]
- Temporal mechanisms of polarization in online reviewsAntonis Matakos, Panayiotis Tsaparas. 529-532 [doi]
- A new approach to bot detection: Striking the balance between precision and recallFred Morstatter, Liang Wu, Tahora H. Nazer, Kathleen M. Carley, Huan Liu. 533-540 [doi]
- Detecting misinformation in online social networks before it is too lateHuiling Zhang, Alan Kuhnle, Huiyuan Zhang, My T. Thai. 541-548 [doi]
- Trustingness & trustworthiness: A pair of complementary trust measures in a social networkAtanu Roy, Chandrima Sarkar, Jaideep Srivastava, Jisu Huh. 549-554 [doi]
- ClearView: Data cleaning for online review miningAmanda J. Minnich, Noor Abu-El-Rub, Maya Gokhale, Ronald Minnich, Abdullah Mueen. 555-558 [doi]
- Forecasting price shocks with social attention and sentiment analysisLi Zhang, Liang Zhang, Keli Xiao, Qi Liu. 559-566 [doi]
- What's in the community cookie jar?Aaron Cahn, Scott Alfeld, Paul Barford, S. Muthukrishnan. 567-570 [doi]
- Mining hidden constrained streams in practice: Informed search in dynamic filter spacesNikolaos Panagiotou, Ioannis Katakis, Dimitrios Gunopulos, Vana Kalogeraki, Elizabeth Daly, Jia Yuan Yu, Brendan O'Brien. 571-578 [doi]
- A Bayesian approach to income inference in a communication networkMartin Fixman, Ariel Berenstein, Jorge Brea, Martin Minnoni, Matias Travizano, Carlos Sarraute. 579-582 [doi]
- Bridge the terminology gap between recruiters and candidates: A multilingual skills base built from social media and linked dataEmmanuel Malherbe, Marie-Aude Aufaure. 583-590 [doi]
- A comparison of methods for cascade predictionRuocheng Guo, Paulo Shakarian. 591-598 [doi]
- App2Vec: Vector modeling of mobile apps and applicationsQiang Ma, S. Muthukrishnan, Wil Simpson. 599-606 [doi]
- Analyzing the spread of chagas disease with mobile phone dataJuan de Monasterio, Alejo Salles, Carolina Lang, Diego Weinberg, Martin Minnoni, Matias Travizano, Carlos Sarraute. 607-612 [doi]
- Social event network analysis: Structure, preferences, and realityMartin Atzmueller, Tom Hanika, Gerd Stumme, Richard Schaller, Bernd Ludwig. 613-620 [doi]
- Analyzing social media marketing in the high-end fashion industry using Named Entity RecognitionJorge Ale Chilet, Cuicui Chen, Yusan Lin. 621-622 [doi]
- Analysis of the behavior of customers in the social networks using data mining techniquesLeidys del Carmen Contreras Chinchilla, Kevin Andrey Rosales Ferreira. 623-625 [doi]
- Evaluating the impact of social media in detecting health-violating restaurantsMikel Joaristi, Edoardo Serra, Francesca Spezzano. 626-633 [doi]
- Agricultural activity shapes the mobility patterns in SenegalS. Martin-Gutierrez, Javier Borondo, A. J. Morales, Juan Carlos Losada, A. M. Tarquis, Rosa M. Benito. 634-641 [doi]
- Scheduled seeding for latent viral marketingAlon Sela, Dmitri Goldenberg, Erez Shmueli, Irad Ben-Gal. 642-643 [doi]
- Evolution of MEDLINE bibliographic database: Preliminary resultsAndrej Kastrin, Thomas C. Rindflesch, Dimitar Hristovski. 644-646 [doi]
- Impact of message sorting on access to novel information in networksBenjamin D. Horne, Sibel Adali, Kevin S. Chan. 647-653 [doi]
- The scientometrics of successful women in scienceCharisse R. Madlock-Brown, David Eichmann. 654-660 [doi]
- Selecting the cases that defined Europe: Complementary metrics for a network analysisFabien Tarissan, Yannis Panagis, Urska Sadl. 661-668 [doi]
- Analysis and visualization of a literature-mined glaucoma gene interaction networkMaha Soliman, Olfa Nasraoui, Nigel G. F. Cooper. 669-676 [doi]
- Model of computer architecture for online social networks flexible data analysis: The case of Twitter dataRomain Giovanetti, Luigi Lancieri. 677-684 [doi]
- Finding street gang members on TwitterLakshika Balasuriya, Sanjaya Wijeratne, Derek Doran, Amit P. Sheth. 685-692 [doi]
- Exploring public sentiments for livable places based on a crowd-calibrated sentiment analysis mechanismLinlin You, Bige Tuncer. 693-700 [doi]
- Modeling Twitter as weighted complex networks using retweetsMuhammad Hrishiah, Maytham Safar, Khaled Mahdi. 701-702 [doi]
- Centrality measures in close group of adolescent females and their association with individual character strengthsNarotam Singh, Sheetal Varshney, Amita Kapoor. 703-710 [doi]
- Unsupervised models for predicting strategic relations between organizationsShachi H. Kumar, Jay Pujara, Lise Getoor, David Mares, Dipak Gupta, Ellen Riloff. 711-718 [doi]
- A probalistic approach to automatically extract new words from social mediaGeetika Sarna, M. P. S. Bhatia. 719-725 [doi]
- Multilevel exploration in Twitter social streamLuigi Lancieri, Romain Giovanetti. 726-731 [doi]
- Mimicry in online conversations: An exploratory study of linguistic analysis techniquesTom Carrick, Awais Rashid, Paul J. Taylor. 732-736 [doi]
- Identifying Chinese lexical inference using probabilistic soft logicWei-Chung Wang, Lun-Wei Ku. 737-743 [doi]
- Descriptive group detection in two-mode data networks using biclusteringAbdélilah Balamane, Rokia Missaoui, Léonard Kwuida, Jean Vaillancourt. 744-749 [doi]
- ECO: Entity-level captioning in contextHyunsouk Cho, Seung-won Hwang. 750-751 [doi]
- EXTRACT: New extraction algorithm of association rules from frequent itemsetsIlhem Feddaoui, Faîçal Felhi, Jalel Akaichi. 752-756 [doi]
- Detecting community patterns capturing exceptional link trailsMartin Atzmueller. 757-764 [doi]
- A memory-efficient heuristic for maximum matching in scale-free networksUpul Senanayake, Mahendra Piraveenan. 765-767 [doi]
- The tale of two clocksZvi Lotker. 768-776 [doi]
- Toward understanding how users respond to rumours in social mediaAnh Dang, Michael Smit, Abidalrahman Moh'd, Rosane Minghim, Evangelos E. Milios. 777-784 [doi]
- Analyzing the usage of social media during spanish presidential electoral campaignsJavier Borondo, A. J. Morales, Juan Carlos Losada, Rosa M. Benito. 785-792 [doi]
- The social media election agenda: Issue salience on Twitter during the European and Swedish 2014 electionsLinn Sandberg, Shatha Jaradat, Nima Dokoohaki. 793-794 [doi]
- An analysis of sentiments on facebook during the 2016 U.S. presidential electionSaud Alashri, Srinivasa Srivatsav Kandala, Vikash Bajaj, Roopek Ravi, Kendra L. Smith, Kevin C. Desouza. 795-802 [doi]
- Social media, spillover, and Saudi Arabian Women's right to drive movements: Analyzing interconnected online collective actionsSerpil Tokdemir, Nitin Agarwal, Rolf T. Wigand. 803-810 [doi]
- Spam detection of Twitter traffic: A framework based on random forests and non-uniform feature samplingClaudia Meda, Edoardo Ragusa, Christian Gianoglio, Rodolfo Zunino, Augusto Ottaviano, Eugenio Scillia, Roberto Surlinelli. 811-817 [doi]
- Virtual indicators of sex trafficking to identify potential victims in online advertisementsMichelle Ibanez, Rich Gazan. 818-824 [doi]
- Investigative simulation: Towards utilizing graph pattern matching for investigative searchBenjamin W. K. Hung, Anura P. Jayasumana. 825-832 [doi]
- The rise & fall of #NoBackDoor on Twitter: The apple vs. FBI caseSamer Al-khateeb, Nitin Agarwal. 833-836 [doi]
- Argumentation models for cyber attributionEric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef. 837-844 [doi]
- Graph analytics for healthcare fraud risk estimationLuther Karl Branting, Flo Reeder, Jeffrey Gold, Timothy Champney. 845-851 [doi]
- Retweet prediction considering user's difference as an author and retweeterSyeda Nadia Firdaus, Chen Ding, Alireza Sadeghian. 852-859 [doi]
- CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilitiesSudip Mittal, Prajit Kumar Das, Varish Mulwad, Anupam Joshi, Tim Finin. 860-867 [doi]
- Hidden social networks analysis by semantic mining of noisy corporaChristophe Thovex. 868-875 [doi]
- Detecting covert sex trafficking networks in virtual marketsMichelle Ibanez, Daniel D. Suthers. 876-879 [doi]
- Temporal analysis of radical dark web forum usersAndrew J. Park, Brian Beck, Darrick Fletche, Patrick Lam, Herbert H. Tsang. 880-883 [doi]
- Cyberbullying detection using probabilistic socio-textual information fusionVivek K. Singh, Qianjia Huang, Pradeep K. Atrey. 884-887 [doi]
- Understanding alliance and opposition among violent groupsQuan Zheng 0001, David B. Skillicorn. 888-891 [doi]
- Detecting sex trafficking circuits in the U.S. through analysis of online escort advertisementsMichelle Ibanez, Rich Gazan. 892-895 [doi]
- FriendRank: A personalized approach for tweets ranking in social networksMin Li, Linfeng Luo, Lin Miao, Yibo Xue, Zhiyun Zhao, Zhenyu Wang. 896-900 [doi]
- Personalized recommendation for new questions in community question answeringLin Wang, Bin Wu, Juan Yang, Shuang Peng. 901-908 [doi]
- Time preference aware dynamic recommendation enhanced with location, social network and temporal informationMakbule Gulcin Ozsoy, Faruk Polat, Reda Alhajj. 909-916 [doi]
- An intelligent method for optimization of tariffs in GSM networksBuket Kaya. 917-920 [doi]
- Big data mining of social networks for friend recommendationFan Jiang, Carson K. Leung, Adam G. M. Pazdor. 921-922 [doi]
- Mining 'following' patterns from big sparse social networksCarson K. Leung, Edson M. Dela Cruz, Trevor L. Cook, Fan Jiang. 923-930 [doi]
- Frequent and non-frequent pattern detection in big data streams: An experimental simulation in 1 trillion data pointsKonstantinos F. Xylogiannopoulos, Reda Alhajj, Panagiotis Karampelas. 931-938 [doi]
- Mining quad closure patterns in InstagramAhmet Anil Mungen, Mehmet Kaya. 939-944 [doi]
- Co-clustering signed 3-partite graphsSefa Sahin Koc, Ismail Hakki Toroslu, Hasan Davulcu. 945-948 [doi]
- Classification of HIV data by constructing a social network with frequent itemsetsYunuscan Kocak, Tansel Özyer, Reda Alhajj. 949-953 [doi]
- A new topological metric for link prediction in directed, weighted and temporal networksErtan Butun, Mehmet Kaya, Reda Alhajj. 954-959 [doi]
- Spectral graph-based semi-supervised learning for imbalanced classesQuan Zheng 0001, David B. Skillicorn. 960-967 [doi]
- Predicting good fit students by correlating relevant personality traits with academic/career dataMuhammad Fahim Uddin, JeongKyu Lee. 968-975 [doi]
- Examining place categories for link prediction in Location Based Social NetworksAhmet Engin Bayrak, Faruk Polat. 976-979 [doi]
- Spiral of silence in social networks: A data-driven approachLinfeng Luo, Min Li, Qing Wang, Yibo Xue, Chunyang Liu, Zhenyu Wang. 980-984 [doi]
- On data collection, graph construction, and sampling in TwitterJeremy D. Wendt, Randy Wells, Richard V. Field, Sucheta Soundarajan. 985-992 [doi]
- An experimental evaluation of giraph and GraphChiJunnan Lu, Alex Thomo. 993-996 [doi]
- A privacy weaving pipeline for open big dataYuan-Chih Yu, Dwen-Ren Tsai. 997-998 [doi]
- Study of transductive learning and unsupervised feature construction methods for biological sequence classificationAna Stanescu 0001, Karthik Tangirala, Doina Caragea. 999-1006 [doi]
- Understanding Crohn's disease patients reaction to infliximab from facebook: A medical perspectiveMarco Roccetti, Paola Salomoni, Catia Prandi, Gustavo Marfia, M. Montagnani, L. Gningaye. 1007-1010 [doi]
- Efficient adverse drug event extraction using Twitter sentiment analysisYang Peng, Melody Moh, Teng-Sheng Moh. 1011-1018 [doi]
- A hybrid statistical and semantic model for identification of mental health and behavioral disorders using social network analysisMadan Krishnamurthy, Khalid Mahmood Malik, Pawel Marcinek. 1019-1026 [doi]
- A Personal Health Recommender System incorporating personal health records, modular ontologies, and crowd-sourced dataHengyi Hu, Adam Elkus, Larry Kerschberg. 1027-1033 [doi]
- A smart phone application in improving healthy lifestyles and health outcomes for school-age children with asthmaChia-Tung Wu, Yu-Fen Tzeng, Te-Wei Ho, Shyh-Wei Chen, Bih-Shya Gau, Feipei Lai, Hung-Yu Chiu. 1034-1037 [doi]
- Mining Electronic Physical Records, a trialXiaohui Wei, Wenyang Zou, Shang Gao. 1038-1043 [doi]
- Machine learning approach for distinction of ADHD and OSAKuo-Chung Chu, Hsin-Jou Huang, Yu-Shu Huang. 1044-1049 [doi]
- A fuzzy model for friendship prediction in healthcare social networksZeineb Dhouioui, Helmi Tlich, Radhia Toujeni, Jalel Akaichi. 1050-1054 [doi]
- Aging data in dynamic graphs: A comparative studyAnita Zakrzewska, David A. Bader. 1055-1062 [doi]
- Detecting overlapping community hierarchies in dynamic graphsPascal Held, Rudolf Kruse. 1063-1070 [doi]
- Assessment of effectiveness of content models for approximating Twitter social connection structuresKuntal Dey, Sahil Agrawal, Rahul Malviya, Saroj Kaushik. 1071-1078 [doi]
- A holistic approach for predicting links in coevolving multiplex networksAlireza Hajibagheri, Gita Sukthankar, Kiran Lakkaraju. 1079-1086 [doi]
- Modeling the joint dynamics of relational events and individual statesAaron Schecter, Noshir Contractor. 1087-1094 [doi]
- The Haka network: Evaluating rugby team performance with dynamic graph analysisPaolo Cintia, Michele Coscia, Luca Pappalardo. 1095-1102 [doi]
- Mining social interactions in privacy-preserving temporal networksFederico Musciotto, Saverio Delpriori, Paolo Castagno, Evangelos Pournaras. 1103-1110 [doi]
- Narrative smoothing: Dynamic conversational network for the analysis of TV series plotsXavier Bost, Vincent Labatut, Serigne Gueye, Georges Linarès. 1111-1118 [doi]
- Knowledge flow of biomedical informatics domain: Position-based co-citation analysis approachKuo-Chung Chu, Chun-Cheng Yeh. 1119-1126 [doi]
- Deep learning for financial sentiment analysis on finance news providersMin-Yuh Day, Chia-Chou Lee. 1127-1134 [doi]
- The effect of customer perceived value on relationship quality between illustrator and fans to recommendation on facebookMin-Yuh Day, Wei-Chun Chuang. 1135-1142 [doi]
- Forming a research team of experts in expert-skill co-occurrence network of research newsJuan Yang, Mengxin Li, Bin Wu, Chenyang Xu. 1143-1150 [doi]
- A comparative study of social network classifiers for predicting churn in the telecommunication industryMaria Oskarsdottir, Cristián Bravo, Wouter Verbeke, Carlos Sarraute, Bart Baesens, Jan Vanthienen. 1151-1158 [doi]
- A novel approach for m-representative skyline queryHeng-Shiou Sheu, Yi-Chung Chen, Don-Lin Yang. 1159-1162 [doi]
- Toward understanding the cliques of opinion spammers with social network analysisChih-Chien Wang, Min-Yuh Day, Yu-Ruei Lin. 1163-1169 [doi]
- Movie review analysis: Emotion analysis of IMDb movie reviewsKamil Topal, Gultekin Özsoyoglu. 1170-1176 [doi]
- Investor classification and sentiment analysisArijit Chatterjee, William Perrizo. 1177-1180 [doi]
- Personal networks and perception of careJulian Fares, Kon Shing Kenneth Chung. 1181-1188 [doi]
- Evolutionary algorithm for seed selection in social influence processMichal Weskida, Radoslaw Michalski. 1189-1196 [doi]
- Analysis of link formation, persistence and dissolution in NetSense dataAshwin Bahulkar, Boleslaw K. Szymanski, Omar Lizardo, Yuxiao Dong, Yang Yang 0008, Nitesh V. Chawla. 1197-1204 [doi]
- Improving the robustness of the smart grid using a multi-objective key player identification approachR. Chulaka Gunasekara, Kishan G. Mehrotra, Chilukuri K. Mohan. 1205-1212 [doi]
- Towards social network analytics for understanding and managing enterprise data lakesAshley Farrugia, Rob Claxton, Simon Thompson. 1213-1220 [doi]
- Hybrid structure-based link prediction modelFei Gao King's, Katarzyna Musial-Gabrys. 1221-1228 [doi]
- Community evolution in multiplex layer aggregationBrian Crawford, Ralucca Gera, Ryan Miller, Bijesh Shrestha. 1229-1237 [doi]
- Automatic tattoo image registration systemXuan Xu, Michael Martin, Thirimachos Bourlai. 1238-1243 [doi]
- Dynamic prediction & estimation of intentional failures in HPCsA. D. Clark, L. M. Tellez, S. Besse, J. M. Absher. 1244-1250 [doi]
- Identification of extremism on TwitterYifang Wei, Lisa Singh, Susan Martin. 1251-1255 [doi]
- Stream clustering of tweetsSophie Baillargeon, Simon Hallé, Christian Gagné. 1256-1261 [doi]
- Profiling individuals based on email analysis and ego networks: A visualization techniqueAntreas Xenaros, Panagiotis Karampelas, Ioanna K. Lekea. 1262-1269 [doi]
- Sentiment-enhanced multidimensional analysis of online social networks: Perception of the mediterranean refugees crisisMauro Coletto, Andrea Esuli, Claudio Lucchese, Cristina Ioana Muntean, Franco Maria Nardini, Raffaele Perego, Chiara Renso. 1270-1277 [doi]
- On the effectiveness of statistical hypothesis testing in infrared-based face recognition in heterogeneous environmentsNeeru Narang, Thirimachos Bourlai. 1278-1285 [doi]
- Toward understanding spatial dependence on epidemic thresholds in networksZesheng Chen. 1286-1293 [doi]
- Observations on the role of influence in the difficulty of social network controlDave McKenney, Tony White. 1294-1301 [doi]
- Estimating influence of social media users from sampled social networksKazuma Kimura, Sho Tsugawa. 1302-1308 [doi]
- Stability of certainty and opinion in influence networksAriel Webster, Bruce M. Kapron, Valerie King. 1309-1320 [doi]
- Influential user detection on Twitter: Analyzing effect of focus rateZeynep Zengin Alp, Sule Gündüz Ögüdücü. 1321-1328 [doi]
- An empirical evaluation of social influence metricsNikhil Kumar, Ruocheng Guo, Ashkan Aleali, Paulo Shakarian. 1329-1336 [doi]
- Is it truly a 5-star movie? Restoring the movie's truthful ratingWeiyue Huang, Yong Yu. 1337-1338 [doi]
- Emerging threats abusing phone numbers exploiting cross-platform featuresSrishti Gupta. 1339-1341 [doi]
- GeoContext: Discovering geographical topics from social mediaElizabeth Williams. 1342-1346 [doi]
- Detecting and mitigating bias in social mediaFred Morstatter. 1347-1348 [doi]
- Noise Removal and Structured Data Detection to improve search for personality featuresMuhammad Fahim Uddin. 1349-1355 [doi]
- Towards using subpattern distributions in Social Network AnalysisBenjamin Cabrera. 1356-1363 [doi]
- Arguments and interpretation in big social data analysis: A survey of the ASONAM communityCandice L. Lanius. 1364-1367 [doi]
- Identifying the impact of friends on their peers academic performancePhilip Scanlon. 1368-1369 [doi]
- A platform for identifying experts and paper retrieval in citation networksQianwei Wang, Qianshan Yu, Xinyue Yu. 1370-1371 [doi]
- Gamification for informal terms lexicon buildingFernando H. Calderon Alvarado, Yi-Shin Chen. 1372-1373 [doi]
- Social network of software development at GitHubWilliam Leibzon. 1374-1376 [doi]
- BullyBlocker: Towards the identification of cyberbullying in social networking sitesYasin N. Silva, Christopher Rich, Deborah Hall. 1377-1379 [doi]
- Learning triadic influence in large social networksChenhui Zhang, Sida Gao, Jie Tang, Tracy Xiao Liu, Zhanpeng Fang, Xu Cheng. 1380-1381 [doi]
- Local community detection in multilayer networksRoberto Interdonato, Andrea Tagarelli, Dino Ienco, Arnaud Sallaberry, Pascal Poncelet. 1382-1383 [doi]
- Node-centric detection of overlapping communities in social networksYehonatan Cohen, Danny Hendler, Amir Rubin. 1384-1385 [doi]
- Social network change detection using a genetic algorithm based back propagation neural network modelZe Li, Duoyong Sun, Jie Li, Zhan-feng Li. 1386-1387 [doi]
- Towards predicting academic impact from mainstream news and weblogs: A heterogeneous graph based approachMohan Timilsina, Brian Davis, Mike Taylor, Conor Hayes. 1388-1389 [doi]
- Towards sentiment analysis for mobile devicesJohnnatan Messias, João Paulo Diniz, Elias Soares, Miller Ferreira, Matheus Araújo, Lucas Bastos, Manoel Miranda, Fabrício Benevenuto. 1390-1391 [doi]
- Trivia quiz mining using probabilistic knowledgeTaesung Lee, Seung-won Hwang, Zhongyuan Wang. 1392-1393 [doi]
- Troll vulnerability in online social networksParaskevas Tsantarliotis, Evaggelia Pitoura, Panayiotis Tsaparas. 1394-1396 [doi]
- ARC: A pipeline approach enabling large-scale graph visualizationMichael Ferron, Ken Q. Pu, Jaroslaw Szlichta. 1397-1400 [doi]
- BullyBlocker: An app to identify cyberbullying in facebookYasin N. Silva, Christopher Rich, Jaime Chon, Lisa M. Tsosie. 1401-1405 [doi]
- CredFinder: A real-time tweets credibility assessing systemMajed A. Alrubaian, Muhammad Al-Qurishi, Mabrook S. Alrakhami, Mohammad Mehedi Hassan, Atif Alamri. 1406-1409 [doi]
- Finding requests in social media for disaster reliefTahora H. Nazer, Fred Morstatter, Harsh Dani, Huan Liu. 1410-1413 [doi]
- GiveMeExample: Learning confusing words by example sentencesChieh-Yang Huang, Lun-Wei Ku. 1414-1417 [doi]
- MIDAS: Mental illness detection and analysis via social mediaElvis Saravia, Chun-Hao Chang, Renaud Jollet De Lorenzo, Yi-Shin Chen. 1418-1421 [doi]
- Polinode: A web application for the collection and analysis of network dataAndrew M. Pitts. 1422-1425 [doi]
- POSN: A privacy preserving decentralized social network app for mobile devicesEric Klukovich, Esra Erdin, Mehmet Hadi Gunes. 1426-1429 [doi]
- PRO-Fit: Exercise with friendsSaumil Dharia, Vijesh Jain, Jvalant Patel, Jainikkumar Vora, Rizen Yamauchi, Magdalini Eirinaki, Iraklis Varlamis. 1430-1433 [doi]
- VirtualIdentity: Privacy preserving user profilingSisi Wang, Wing-Sea Poon, Golnoosh Farnadi, Caleb Horst, Kebra Thompson, Michael Nickels, Anderson C. A. Nascimento, Martine De Cock. 1434-1437 [doi]
- A centrality-based measure of user privacy in online social networksRuggero G. Pensa, Gianpiero di Blasi. 1438-1439 [doi]