


default search action
SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013: Washington, DC, USA
- International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013. IEEE Computer Society 2013, ISBN 978-0-7695-5137-1

- Arcot Rajasekar, Sharlini Sankaran

, Howard Lander, Thomas M. Carsey, Jonathan David Crabtree, Hye-Chung Kum, Mercè Crosas, Gary King, Justin Zhan:
Sociometric Methods for Relevancy Analysis of Long Tail Science Data. 1-6 - Varun Sharma, Jeremy Carroll, Abhi Khune:

Scaling Deep Social Feeds at Pinterest. 7-12 - Nyunsu Kim, Sukru Tikves, Zheng Wang, Jonathan Githens-Mazer, Hasan Davulcu:

MultiScale Modeling of Islamic Organizations in UK. 13-18 - Sujoy Sikdar

, Byungkyu Kang, John O'Donovan, Tobias Höllerer, Sibel Adali:
Understanding Information Credibility on Twitter. 19-24 - Amogh Mahapatra, Jaideep Srivastava

:
Incongruity Versus Incongruity Resolution. 25-32 - Jason Tsai, Yundi Qian, Yevgeniy Vorobeychik

, Christopher Kiekintveld, Milind Tambe:
Bayesian Security Games for Controlling Contagion. 33-38 - Federica Giummolè

, Salvatore Orlando
, Gabriele Tolomei
:
Trending Topics on Twitter Improve the Prediction of Google Hot Queries. 39-44 - Fatih Kocak, George Kesidis, Tuan-Minh Pham

, Serge Fdida:
The Effect of Caching on a Model of Content and Access Provider Revenues in Information-centric Networks. 45-50 - Kuzman Katkalov, Kurt Stenzel, Marian Borek, Wolfgang Reif

:
Model-Driven Development of Information Flow-Secure Systems with IFlow. 51-56 - Delfina Malandrino

, Vittorio Scarano
, Raffaele Spinelli:
How Increased Awareness Can Impact Attitudes and Behaviors toward Online Privacy Protection. 57-62 - Tad Hogg, Kristina Lerman, Laura M. Smith:

Using Stochastic Models to Predict User Response in Social Media. 63-68 - Amy X. Zhang, Anastasios Noulas, Salvatore Scellato, Cecilia Mascolo:

Hoodsquare: Modeling and Recommending Neighborhoods in Location-Based Social Networks. 69-74 - Chloë Brown

, Anastasios Noulas, Cecilia Mascolo, Vincent D. Blondel:
A Place-Focused Model for Social Networks in Cities. 75-80 - Victoria Lai, William Rand

:
Does Love Change on Twitter? The Dynamics of Topical Conversations in Microblogging. 81-86 - Akshay Patil, Golnaz Ghasemiesfeh, Roozbeh Ebrahimi, Jie Gao:

Quantifying Social Influence in Epinions. 87-92 - Nibir Bora, Vladimir Zaytsev, Yu-Han Chang, Rajiv T. Maheswaran:

Gang Networks, Neighborhoods and Holidays: Spatiotemporal Patterns in Social Media. 93-101 - David Darmon, Jared Sylvester, Michelle Girvan, William Rand

:
Predictability of User Behavior in Social Media: Bottom-Up v. Top-Down Modeling. 102-107 - Khalid Zaman Bijon, Ram Krishnan

, Ravi S. Sandhu:
Towards an Attribute Based Constraints Specification Language. 108-113 - Hongwei Tian, Weining Zhang:

Privacy-Preserving Data Publishing Based on Utility Specification. 114-121 - Mingming Chen, Tommy Nguyen, Boleslaw K. Szymanski

:
On Measuring the Quality of a Network Community Structure. 122-127 - Muhammad Asif Hossain Khan, Danushka Bollegala

, Guangwen Liu, Kaoru Sezaki:
Multi-tweet Summarization of Real-Time Events. 128-133 - Noseong Park, Michael Ovelgönne, V. S. Subrahmanian:

SMAC: Subgraph Matching and Centrality in Huge Social Networks. 134-141 - Claudiu Cristian Musat, Boi Faltings, Philippe Rousille:

Direct Negative Opinions in Online Discussions. 142-147 - Zahy Bnaya, Rami Puzis

, Roni Stern
, Ariel Felner
:
Bandit Algorithms for Social Network Queries. 148-153 - Hao Xu, Zhenwen Wang, Weidong Xiao:

Analyzing Community Core Evolution in Mobile Social Networks. 154-161 - Jianping He, David J. Miller, George Kesidis:

Latent Interest-Group Discovery and Management by Peer-to-Peer Online Social Networks. 162-167 - Sedat Gokalp, M'hamed H. Temkit, Hasan Davulcu, Ismail Hakki Toroslu

:
Partitioning and Scaling Signed Bipartite Graphs for Polarized Political Blogosphere. 168-173 - Vivek K. Singh, Laura J. Freeman, Bruno Lepri, Alex Pentland:

Predicting Spending Behavior Using Socio-mobile Features. 174-179 - Tanmoy Chakraborty

, Srijan Kumar, M. Dastagiri Reddy, Suhansanu Kumar, Niloy Ganguly
, Animesh Mukherjee:
Automatic Classification and Analysis of Interdisciplinary Fields in Computer Sciences. 180-187 - Bogdan Vasilescu

, Vladimir Filkov, Alexander Serebrenik
:
StackOverflow and GitHub: Associations between Software Development and Crowdsourced Knowledge. 188-195 - Ying Chen, Sencun Zhu, Heng Xu, Yilu Zhou:

Children's Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness. 196-203 - Konstantin Kuzmin

, Syed Yousaf Shah, Boleslaw K. Szymanski
:
Parallel Overlapping Community Detection with SLPA. 204-212 - Liliya I. Besaleva, Alfred C. Weaver

:
Applications of Social Networks and Crowdsourcing for Disaster Management Improvement. 213-219 - Tobias Baur

, Ionut Damian, Patrick Gebhard, Kaska Porayska-Pomsta, Elisabeth André
:
A Job Interview Simulation: Social Cue-Based Interaction with a Virtual Character. 220-227 - Suman Kalyan Maity, Abhishek Porwal, Animesh Mukherjee:

Understanding How Learning Affects Agreement Process in Social Networks. 228-235 - Laura M. Smith, Linhong Zhu, Kristina Lerman, Zornitsa Kozareva:

The Role of Social Media in the Discussion of Controversial Topics. 236-243 - Nathaniel Dykhuis, Paul R. Cohen, Yu-Han Chang:

Simulating Team Formation in Social Networks. 244-253 - Ahmed Abbasi

, Tianjun Fu, Daniel Zeng, Donald A. Adjeroh:
Crawling Credible Online Medical Sentiments for Social Intelligence. 254-263 - Mostafa Karamibekr, Ali A. Ghorbani:

A Structure for Opinion in Social Domains. 264-271 - Giacomo Inches

, Morgan Harvey
, Fabio Crestani
:
Finding Participants in a Chat: Authorship Attribution for Conversational Documents. 272-279 - Anisha Mazumder, Arun Das

, Nyunsu Kim, Sedat Gokalp, Arunabha Sen, Hasan Davulcu:
Spatio-temporal Signal Recovery from Political Tweets in Indonesia. 280-287 - Mahendra Piraveenan, Shahadat Uddin

, Gnana Thedchanamoorthy
:
Effect of Vaccination Strategies on the Herd Immunity of Growing Networks. 288-294 - Jessica Staddon, Alessandro Acquisti

, Kristen LeFevre:
Self-Reported Social Network Behavior: Accuracy Predictors and Implications for the Privacy Paradox. 295-302 - Claudia Wagner, Sitaram Asur, Joshua M. Hailpern:

Religious Politicians and Creative Photographers: Automatic User Categorization in Twitter. 303-310 - Clayton Fink, Nathan Bos, Alexander Perrone, Edwina Liu, Jonathon Kopecky:

Twitter, Public Opinion, and the 2011 Nigerian Presidential Election. 311-320 - Oded Green, David A. Bader

:
Faster Clustering Coefficient Using Vertex Covers. 321-330 - Akshay Patil, Juan Liu, Jianqiang Shen, Oliver Brdiczka, Jie Gao, John Hanley:

Modeling Attrition in Organizations from Email Communication. 331-338 - Olga Peled, Michael Fire, Lior Rokach, Yuval Elovici:

Entity Matching in Online Social Networks. 339-344 - Marina Boia, Boi Faltings, Claudiu Cristian Musat, Pearl Pu:

A : ) Is Worth a Thousand Words: How People Attach Sentiment to Emoticons and Words in Tweets. 345-350 - Maryam Fatemi, Laurissa N. Tokarchuk:

A Community Based Social Recommender System for Individuals & Groups. 351-356 - Ammar Hassan, Ahmed Abbasi, Daniel Zeng:

Twitter Sentiment Analysis: A Bootstrap Ensemble Framework. 357-364 - Patrick Hennig, Philipp Berger, Christoph Meinel, Maria Graber, Jens Hildebrandt, Stefan Lehmann, Cathleen Ramson:

Tracking Visitor Engagement in the Blogosphere for Leveraging Rankings. 365-372 - Grant Stafford, Louis Lei Yu:

An Evaluation of the Effect of Spam on Twitter Trending Topics. 373-378 - Kuan-Hsi Chen, Tyne Liang:

Friendship Prediction on Social Network Users. 379-384 - Haifeng Liu, Zheng Hu, Dian Zhou, Hui Tian:

Cumulative Probability Distribution Model for Evaluating User Behavior Prediction Algorithms. 385-390 - Germán Creamer, Yong Ren, Yasuaki Sakamoto, Jeffrey V. Nickerson

:
News and Sentiment Analysis of the European Market with a Hybrid Expert Weighting Algorithm. 391-396 - Marcello Tomasini

, Franco Zambonelli
, Angelo Brayner
, Ronaldo Menezes
:
Evaluating the Performance of Social Networks of Sensors under Different Mobility Models. 397-402 - Vaskar Raychoudhury, Ajay D. Kshemkalyani

, Daqing Zhang, Jiannong Cao
, Mohit Bakshi, Kanik Gupta, Vishal Mittal, Siddharth Maheshwari:
Automatic Event Scheduling in Mobile Social Network Communities. 403-410 - Toneluh Andrew Yang, Radu E. Vlas, Alan Yang, Cristina Vlas:

Risk Management in the Era of BYOD: The Quintet of Technology Adoption, Controls, Liabilities, User Perception, and User Behavior. 411-416 - Xing Xie, Indrakshi Ray, Raman Adaikkalavan:

On the Efficient Processing of Multilevel Secure Continuous Queries. 417-422 - Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn

, Hadi Sharifi, Haiyong Xie:
ACaaS: Access Control as a Service for IaaS Cloud. 423-428 - Barbara Carminati

, Elena Ferrari
, Ngoc Hong Tran:
Enforcing Trust Preferences in Mobile Person-to-Person Payments. 429-434 - John Slankas, Laurie A. Williams:

Access Control Policy Extraction from Unconstrained Natural Language Text. 435-440 - Michael Oehler, Dhananjay S. Phatak:

A Conjunction for Private Stream Searching. 441-447 - Rui Zhao, Chuan Yue, Kun Sun:

A Security Analysis of Two Commercial Browser and Cloud Based Password Managers. 448-453 - Yang Wang, Yun Huang, Claudia Louis:

Towards a Framework for Privacy-Aware Mobile Crowdsourcing. 454-459 - Afshan Samani, Adrian T. Beinkowski, Raafat Aburukba, Hamada H. Ghenniwa:

Privacy Framework for Open Environments. 460-467 - Anthony Morton:

Measuring Inherent Privacy Concern and Desire for Privacy - A Pilot Survey Study of an Instrument to Measure Dispositional Privacy Concern. 468-477 - Patrick I. Offor

:
Managing Risk in Secure System: Antecedents to System Engineers' Trust Assumptions Decisions. 478-485 - Yasmeen Alufaisan, Alina Campan:

Preservation of Centrality Measures in Anonymized Social Networks. 486-493 - Vincent C. Hu

, Karen Scarfone:
Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit. 494-501 - Xia Yang, Jim Alves-Foss:

Security Policy Refinement: High-Level Specification to Low-Level Implementation. 502-511 - Owen Sacco, John G. Breslin:

"I Like" - Analysing Interactions within Social Networks to Assert the Trustworthiness of Users, Sources and Content. 512-519 - Regina Marin, Guillaume Piolle, Christophe Bidan:

An Analysis Grid for Privacy-Related Properties of Social Network Systems. 520-525 - Eli Omernick, Sara Owsley Sood:

The Impact of Anonymity in Online Communities. 526-535 - Jehwan Oh, Zoheb Hassan Borbora, Dhruv Sharma, Jaideep Srivastava

:
Bot Detection Based on Social Interactions in MMORPGs. 536-543 - Yousra Javed, Mohamed Shehab

:
Access Control Policy Misconfiguration Detection in Online Social Networks. 544-549 - Muhammad Asim

, David Llewellyn-Jones, Brett Lempereur, Bo Zhou, Qi Shi, Madjid Merabti:
Event Driven Monitoring of Composite Services. 550-557 - Amira Bradai, Hossam Afifi:

Game Theoretic Framework for Reputation-Based Distributed Intrusion Detection. 558-563 - Peter J. Radics, Denis Gracanin

, Dennis G. Kafura:
Preprocess before You Build: Introducing a Framework for Privacy Requirements Engineering. 564-569 - W. Brad Moore, Yifang Wei, Adam Orshefsky, Micah Sherr, Lisa Singh, Hui Yang:

Understanding Site-Based Inference Potential for Identifying Hidden Attributes. 570-577 - Michael Hanspach, Jörg Keller:

In Guards We Trust: Security and Privacy in Operating Systems Revisited. 578-585 - Vincent Lalanne, Manuel Munier, Alban Gabillon:

Information Security Risk Management in a World of Services. 586-593 - Michael E. Shin, Swetha Dorbala, Dongsoo Jang:

Threat Modeling for Security Failure-Tolerant Requirements. 594-599 - Johannes Braun, Gregor Rynkowski:

The Potential of an Individualized Set of Trusted CAs: Defending against CA Failures in the Web PKI. 600-605 - Arya Adriansyah, Boudewijn F. van Dongen

, Nicola Zannone
:
Controlling Break-the-Glass through Alignment. 606-611 - Hendrik J. G. Oberholzer, Sunday Olusegun Ojo

, Oludayo O. Olugbara:
A PET Evaluation Framework for Relational Databases. 612-617 - Ezhil Kalaimannan

, Jatinder N. D. Gupta
, Seong-Moo Yoo:
Maximizing Investigation Effectiveness in Digital Forensic Cases. 618-623 - Sharon Paradesi, Ilaria Liccardi, Lalana Kagal, Joe Pato:

A Semantic Framework for Content-Based Access Controls. 624-629 - Yair Diaz-Tellez, Eliane L. Bodanese, Fadi Ali El-Moussa, Theo Dimitrakos

:
Secure Execution Context Enforcement Framework Based on Activity Detection on Data and Applications Hosted on Smart Devices. 630-636 - Jussi Laakkonen, Salla Annala, Pekka Jäppinen:

Abstracted Architecture for Smart Grid Privacy Analysis. 637-646 - Achim D. Brucker

, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
A Framework for Secure Service Composition. 647-652 - Shuo Qiu, Jiqiang Liu, Yanfeng Shi:

Identity-Based Symmetric Private Set Intersection. 653-658 - Yong Wang, Raj Kumar Nepali:

Privacy Measurement for Social Network Actor Model. 659-664 - Xiang Li, Shaoyin Cheng, Wenlong Chen, Fan Jiang:

Effective Method for Promoting Viral Marketing in Microblog. 665-670 - Marco Guerini

, Jacopo Staiano
, Davide Albanese
:
Exploring Image Virality in Google Plus. 671-678 - Sandra Servia Rodríguez, Ana Fernández Vilas

, Rebeca P. Díaz Redondo
, José Juan Pazos-Arias:
Comparing Tag Clustering Algorithms for Mining Twitter Users' Interests. 679-684 - Xing Fang, Justin Zhan, Nicholas Koceja:

Towards Network Reduction on Big Data. 685-690 - Vito Giovanni Castellana, Antonino Tumeo

, Oreste Villa, David Haglin, John Feo:
Composing Data Parallel Code for a SPARQL Graph Engine. 691-699 - Sushil Jajodia

, Witold Litwin, Thomas J. E. Schwarz:
Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds. 700-707 - Salim Jouili, Valentin Vansteenberghe:

An Empirical Comparison of Graph Databases. 708-715 - A. Montplaisir-Goncalves, Naser Ezzati-Jivan, Florian Wininger, Michel R. Dagenais:

State History Tree: An Incremental Disk-Based Data Structure for Very Large Interval Data. 716-724 - Johanna Monti, Mario Monteleone

, Maria Pia di Buono
, Federica Marano:
Natural Language Processing and Big Data - An Ontology-Based Approach for Cross-Lingual Information Retrieval. 725-731 - Salim Jouili, Aldemar Reynaga:

imGraph: A Distributed In-Memory Graph Database. 732-737 - Ehsan Mousavi Khaneghah

, Seyedeh Leili Mirtaheri, Lucio Grandinetti, Amir Saman Memaripour, Mohsen Sharifi
:
A Dynamic Replication Mechanism to Reduce Response-Time of I/O Operations in High Performance Computing Clusters. 738-743 - Bernardo Creamer, Germán Creamer:

Emissions Abating Technology Adoption under the SO2 Permit Market: A Social Networks Approach. 744-749 - Shaun Lichter, Terry L. Friesz

, Christopher Griffin
:
Impact of a Non-linear Pay-Off Function on Pairwise Stable Collaborative Oligopolies. 750-755 - Ta-Wei Hung, Mu-En Wu, Hsueh-I Lu, Jan-Ming Ho:

Rating Equity Funds against Return of Random Traders. 756-761 - Henry Thille, Monica Cojocaru, Edward W. Thommes, Dominic Nelson, Scott Greenhalgh

:
A Dynamic Pricing Game in a Model of New Product Adoption with Social Influence. 762-767 - Carl M. Gustafson:

Three Fiscal Policy Experiments in an Agent-Based Macroeconomic Model. 768-773 - Márcia Baptista, Hugo Damas, Joana Dimas, Guilherme Raimundo, Rui Prada

, Carlos Martinho, Pedro Alexandre Santos
, Jorge F. Peña:
A Serious Game Based on a Public Goods Experiment. 774-781 - Hsin-Tsung Peng, William W. Y. Hsu, Chih-Hung Chen, Feipei Lai, Jan-Ming Ho:

FinancialCloud: Open Cloud Framework of Derivative Pricing. 782-789 - Andrey Bogomolov, Bruno Lepri, Fabio Pianesi:

Happiness Recognition from Mobile Phone Data. 790-795 - Maike Erdmann, Erik Ward, Kazushi Ikeda, Gen Hattori, Chihiro Ono, Yasuhiro Takishima

:
Automatic Labeling of Training Data for Collecting Tweets for Ambiguous TV Program Titles. 796-802 - Caroline Sabty, Martin Memmel, Slim Abdennadher:

GeoEvents - An Interactive Tool to Analyze and Visualize Spatial Information from the Social Web. 803-808 - Germán Creamer, Yong Ren, Jeffrey V. Nickerson

:
Impact of Dynamic Corporate News Networks on Asset Return and Volatility. 809-814 - Nurettin B. Omeroglu, Ismail H. Toroslu

, Sedat Gokalp, Hasan Davulcu:
K-Partitioning of Signed or Weighted Bipartite Graphs. 815-820 - Shih-Hong Jheng, Cheng-Te Li, Hsi-Lin Chen, Man-Kwan Shan:

Popularity Prediction of Social Multimedia Based on Concept Drift. 821-826 - Shaoda Yu, Peng Li, Honghuang Lin, Ehsan Rohani

, Gwan Choi, Botang Shao, Qian Wang:
Support Vector Machine Based Detection of Drowsiness Using Minimum EEG Features. 827-835 - Harun Pirim

:
Finding Number of Clusters in a Gene Co-expression Network Using Independent Sets. 836-839 - Melvin Greer, Manuel Rodríguez-Martínez, Jaime Seguel:

Synthetic Biology Driven by Harnessing Forces of Disruptive Innovation. 840-845 - Luis Javier Herrera, Ignacio Rojas

, Héctor Pomares
, Alberto Guillén
, Olga Valenzuela
, Oresti Baños
:
Classification of MRI Images for Alzheimer's Disease Detection. 846-851 - Ahmad Albu-Shamah, Justin Zhan:

Towards Obesity Causes, Prevalence and Prevention. 852-857 - Pradeep Kumara Wijesekara Abeygunawardhana, Satoru Suzuki, Ichirou Ishimaru, Akira Nishiyama

:
Precision Controlled Variable Phase Filter for Imaging Type Two-Dimensional Spectroscopic Tomography. 858-863 - Mehmet Yagmur Gök, Mahmut Samil Sagiroglu, Cem Ünsalan

, Sezer Gören
:
Programmable Hardware Based Short Read Aligner Using Phred Quality Scores. 864-867 - Shahadat Uddin

, Mahendra Piraveenan, Arif Khan, Babak Amiri:
Conceptual Quantification of the Dynamicity of Longitudinal Social Networks. 868-873 - Stefano Teso

, Jacopo Staiano
, Bruno Lepri
, Andrea Passerini
, Fabio Pianesi:
Ego-centric Graphlets for Personality and Affective States Recognition. 874-877 - Sayooran Nagulendra, Julita Vassileva

:
Minimizing Social Data Overload through Interest-Based Stream Filtering in a P2P Social Network. 878-881 - Song Chen, Samuel Owusu, Lina Zhou:

Social Network Based Recommendation Systems: A Short Survey. 882-885 - Jalel Akaichi

:
Social Networks' Facebook' Statutes Updates Mining for Sentiment Classification. 886-891 - Harry D. Tunnell IV

:
A Pilot Study about Military Users and Information Systems: Exploring Military User Attitudes about Technology. 892-895 - Xuzhen Zhu

, Hui Tian, Zheng Hu, Haifeng Liu:
Self-Adaptive Optimized Link Prediction Based on Weak Ties Theory in Unweighted Network. 896-900 - Yang Song, Zheng Hu, Haifeng Liu, Yu Shi, Hui Tian:

A Novel Group Recommendation Algorithm with Collaborative Filtering. 901-904 - Shohei Usui, Fujio Toriumi

, Takatsugu Hirayama, Kenji Mase:
Analysis of Influential Features for Information Diffusion. 905-908 - Thomas Hughes-Roberts:

Privacy and Social Networks: Is Concern a Valid Indicator of Intention and Behaviour? 909-912 - Zheng Chen, Xiaoqing Du:

Study of Stock Prediction Based on Social Network. 913-916 - Dennis G. Castleberry, Steven R. Brandt, Frank Löffler

:
Inkling: An Executable Paper System for Reviewing Scientific Applications. 917-922 - Nour Salama, Sherif G. Aly

, Ahmed Rafea
:
The Use of Social Context to Enhance Mobile Web Search Experience. 923-927 - Hiroshi Itsuki, Hitoshi Matsubara, Kazuki Arita, Kazunari Omi:

Effective Clusterization of Political Tweets Using Kurtosis and Community Duration. 928-931 - Morgan Madeira, Anupam Joshi

:
Analyzing Close Friend Interactions in Social Media. 932-935 - Bernardo Creamer, Germán Creamer:

Efficiency and Trade Network Analysis of the Electricity Market: 1985-2005. 936-939 - Weizhong Zhao, Venkata Swamy Martha, Gang Chen, Xiaowei Xu:

Fast Information Retrieval and Social Network Mining via Cosine Similarity Upper Bound. 940-943 - Kirk Ogaard:

Synthesizing Social Media Data Using Information Morphing. 944-949 - Matti Mantere

:
Stock Market Manipulation Using Cyberattacks Together with Misinformation Disseminated through Social Media. 950-954 - Jerzy Surma:

The Privacy Problem in Big Bata Applications: An Empirical Study on Facebook. 955-958 - Yue Ming:

Human Activity Recognition Based on 3D Mesh MoSIFT Feature Descriptor. 959-962 - Han Dong

, Milton Halem, Shujia Zhou:
Social Media Data Analytics Applied to Hurricane Sandy. 963-966 - Bowen Ni, Yu-Han Chang, Rajiv T. Maheswaran:

Social Welfare and Inequality in a Networked Resource Game with Human Players. 967-970 - Igor Kanovsky

, Omer Yaary:
Viral Opinion Spreading Model in Social Networks. 971-974 - Radu Machedon, William Rand

, Yogesh V. Joshi
:
Automatic Crowdsourcing-Based Classification of Marketing Messaging on Twitter. 975-978 - Shaymaa Khater, Hicham G. Elmongui, Denis Gracanin

:
Personalized Microblogs Corpus Recommendation Based on Dynamic Users Interests. 979-982 - Suratna Budalakoti, K. Suzanne Barber:

Tournament-Based Reputation Models for Aggregating Relative Preferences. 983-986 - Abdulaziz Almehmadi, Michael Bourque, Khalil El-Khatib

:
A Tweet of the Mind: Automated Emotion Detection for Social Media Using Brain Wave Pattern Analysis. 987-991 - Naim Asaj, Albert Held, Michael Weber:

An Integrative Approach for Measuring Privacy Impact of Identifiers in the Automotive Domain. 992-998 - Neal Gibson, Greg Holland:

TrustEd: A Dual-Database Trusted Broker for Multi-agency Data. 999-1004 - Jaspreet Singh, Ron Ruhl, Dale Lindskog:

GSM OTA SIM Cloning Attack and Cloning Resistance in EAP-SIM and USIM. 1005-1010 - Hidenobu Oguri, Noboru Sonehara:

A K-Anonymity Method Based on SEM (Search Engine Marketing) Price of Personal Information. 1011-1015 - Chikaodili Ekechukwu, Dale Lindskog, Ron Ruhl:

A Notary Extension for the Online Certificate Status Protocol. 1016-1021 - Cheng-Yi Yang, Chien-Tsai Liu

:
Developing IHE-Based PHR Cloud Systems. 1022-1025 - Hyejung Moon, Hyun Suk Cho:

Big Data and Policy Design for Data Sovereignty: A Case Study on Copyright and CCL in South Korea. 1026-1029 - Ana Cervigni Guerra, Marcelo Schneck de Paula Pessôa:

Models for Measuring Access Security of Web Application: Security Reference Model. 1030-1033 - Yu-Hsuan Cheng, Chen Ming Wu, Tsun Ku, Gwo-Dong Chen:

A Predicting Model of TV Audience Rating Based on the Facebook. 1034-1037 - Olga Valenzuela

, Fernando J. Rojas
, Luis Javier Herrera, Francisco M. Ortuño Guzman
, Oresti Baños
, Gonzalo Ruiz, Hind Tribak, Héctor Pomares
, Ignacio Rojas Ruiz
:
Intelligent Systems to Autonomously Classify Several Arrhythmia Using Information from ECG. 1038-1045 - Curtis M. Passmore, Justin Zhan:

Determining Appropriate Staffing Adjustments in a Call Center Staff Group. 1046-1053 - Michael S. Kim:

Robust, Scalable Anomaly Detection for Large Collections of Images. 1054-1058 - Donald J. Kim, Myunggwon Hwang, Jangwon Gim, Sa-Kwang Song, Do-Heon Jeong, Seungwoo Lee, Hanmin Jung:

Intelligent Research Performance Appraisal Model Based on Internal/Environmental Evaluation Features. 1059-1065 - Tianbo Lu

, Xiaobo Guo, Bing Xu, Lingling Zhao, Yong Peng, Hongyu Yang:
Next Big Thing in Big Data: The Security of the ICT Supply Chain. 1066-1073 - Gayathri Nadarajan, Cheng-Lin Yang, Yun-Heh Chen-Burger

, Yu-Jung Cheng, Sun-In Lin, Fang-Pang Lin:
Real-Time Data Streaming Architecture and Intelligent Workflow Management for Processing Massive Ecological Videos. 1074-1080 - Chang-Hoo Jeong, Sung-Pil Choi, Sungho Shin, Seungwoo Lee, Hanmin Jung, Soon-Young Kim, Pyung Kim:

Creating Semantic Data from Relational Database. 1081-1086

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














