


default search action
SocialCom/PASSAT 2011: Boston, MA, USA
- PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Conference on Social Computing (SocialCom), Boston, MA, USA, 9-11 Oct., 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1931-8

SocialCom 2011
Social Networks
- Kevin Robert Canini, Bongwon Suh, Peter Pirolli:

Finding Credible Information Sources in Social Networks Based on Content and Social Structure. 1-8 - Kwan Hong Lee, Andrew Lippman, Alex Pentland, Elenna R. Dugundji

:
The Impacts of Just-in-Time Social Networks on People's Choices in the Real World. 9-18 - Robert Gove

, Nick Gramsky, Rose Kirby, Emre Sefer
, Awalin Sopan, Cody Dunne
, Ben Shneiderman, Meirav Taieb-Maimon
:
NetVisia: Heat Map & Matrix Visualization of Dynamic Social Network Statistics & Content. 19-26 - Krzysztof Juszczyszyn, Katarzyna Musial, Marcin Budka:

Link Prediction Based on Subgraph Evolution in Dynamic Social Networks. 27-34 - Nam P. Nguyen, Thang N. Dinh

, Dung T. Nguyen, My T. Thai:
Overlapping Community Structures and Their Detection on Social Networks. 35-40 - Motahhare Eslami, Hamid R. Rabiee

, Mostafa Salehi
:
DNE: A Method for Extracting Cascaded Diffusion Networks from Social Networks. 41-48
Social Networks
- Justin Cheng, Daniel Mauricio Romero, Brendan Meeder, Jon M. Kleinberg:

Predicting Reciprocity in Social Networks. 49-56 - Enrique Frías-Martínez

, Graham Williamson, Vanessa Frías-Martínez:
An Agent-Based Model of Epidemic Spread Using Human Mobility and Social Network Information. 57-64 - Greg Bigwood, Tristan Henderson

:
IRONMAN: Using Social Networks to Add Incentives and Reputation to Opportunistic Networks. 65-72 - Michael Fire, Lena Tenenboim, Ofrit Lesser, Rami Puzis

, Lior Rokach, Yuval Elovici:
Link Prediction in Social Networks Using Computationally Efficient Topological Features. 73-80 - Lu Han, Badri Nath, Liviu Iftode, S. Muthukrishnan:

Social Butterfly: Social Caches for Distributed Social Networks. 81-86
Gaming
- Derek L. Hansen, David W. Jacobs, Darcy Lewis, Arijit Biswas, Jennifer Preece, Dana Rotman, Eric Stevens:

Odd Leaf Out: Improving Visual Recognition with Games. 87-94 - Kan-Leung Cheng, Inon Zuckerman

, Dana S. Nau, Jennifer Golbeck:
The Life Game: Cognitive Strategies for Repeated Stochastic Games. 95-102 - Eni Mustafaraj, Samantha Finn, Carolyn Whitlock, Panagiotis Takis Metaxas:

Vocal Minority Versus Silent Majority: Discovering the Opionions of the Long Tail. 103-110 - Jeon-Hyung Kang, Jihie Kim:

Analyzing Answers in Threaded Discussions Using a Role-Based Information Network. 111-117 - Kan-Leung Cheng, Ugur Kuter, Jennifer Golbeck:

Coevolving Strategies in Social-Elimination Games. 118-126 - Muhammad Aurangzeb Ahmad, Brian Keegan

, Sophia D. Sullivan, Dmitri Williams, Jaideep Srivastava
, Noshir S. Contractor:
Illicit Bits: Detecting and Analyzing Contraband Networks in Massively Multiplayer Online Games. 127-134 - Kyong Jin Shim

, Kuo-Wei Hsu, Jaideep Srivastava
:
An Exploratory Study of Player Performance, Motivation, and Enjoyment in Massively Multiplayer Online Role-Playing Games. 135-140 - Eunkyung Kim, Luyan Chi, Yu-Han Chang, Rajiv T. Maheswaran:

Dynamics of Social Interactions in a Network Game. 141-148
Prediction
- Jennifer Golbeck, Cristina Robles, Michon Edmondson, Karen Turner:

Predicting Personality from Twitter. 149-156 - Zoheb Borbora, Jaideep Srivastava

, Kuo-Wei Hsu, Dmitri Williams:
Churn Prediction in MMORPGs Using Player Motivation Theories and an Ensemble Approach. 157-164 - Panagiotis Takis Metaxas, Eni Mustafaraj, Daniel Gayo-Avello

:
How (Not) to Predict Elections. 165-171 - Mina Doroud, Prantik Bhattacharyya, Shyhtsun Felix Wu, Diane Felmlee:

The Evolution of Ego-Centric Triads: A Microscopic Approach toward Predicting Macroscopic Network Properties. 172-179 - Daniele Quercia, Michal Kosinski

, David Stillwell, Jon Crowcroft
:
Our Twitter Profiles, Our Selves: Predicting Personality with Twitter. 180-185 - Akshaya Iyengar, Tim Finin, Anupam Joshi

:
Content-Based Prediction of Temporal Boundaries for Events in Twitter. 186-191 - Michael D. Conover, Bruno Gonçalves

, Jacob Ratkiewicz, Alessandro Flammini, Filippo Menczer:
Predicting the Political Alignment of Twitter Users. 192-199
Social Search and Understanding
- Wei Pan, Nadav Aharony, Alex Pentland:

Fortune Monitor or Fortune Teller: Understanding the Connection between Interaction Patterns and Financial Status. 200-207 - Sai T. Moturu, Inas Khayal, Nadav Aharony, Wei Pan, Alex Pentland:

Using Social Sensing to Understand the Links between Sleep, Mood, and Sociability. 208-214 - Jeon-Hyung Kang, Kristina Lerman:

Leveraging User Diversity to Harvest Knowledge on the Social Web. 215-222 - Francesco Calabrese, Dominik Dahlem, Alexandre Gerber, DeDe Paul, Xiaoji Chen, James Rowland, Christopher Rath, Carlo Ratti:

The Connected States of America: Quantifying Social Radii of Influence. 223-230 - Yves-Alexandre de Montjoye, Jesika Haria, Manuel Cebrián, Alex Pentland:

The Need for Champions for Approximate Social Search. 231-234 - Koji Kamei, Tetsushi Ikeda, Hiroyuki Kidokoro, Masayuki Shiomi, Akira Utsumi, Kazuhiko Shinozawa, Takahiro Miyashita, Norihiro Hagita:

Effectiveness of Cooperative Customer Navigation from Robots around a Retail Shop. 235-241
Social Mining, Analysis, and Recommendation
- Enkh-Amgalan Baatarjav, Ram Dantu:

Unveiling Hidden Patterns to Find Social Relevance. 242-249 - Bjoern Elmar Macek, Martin Atzmueller, Gerd Stumme

:
Profile Mining in CVS-Logs and Face-to-Face Contacts for Recommending Software Developers. 250-257 - Adrien Friggeri, Guillaume Chelius, Eric Fleury:

Triangles to Capture Social Cohesion. 258-265 - Carolin Kaiser

, Alexander Piazza, Johannes Kröckel, Freimut Bodendorf:
Are Humans Like Ants? - Analyzing Collective Opinion Formation in Online Discussions. 266-273 - Baojun Qiu, Kang Zhao, Prasenjit Mitra, Dinghao Wu, Cornelia Caragea

, John Yen, Greta E. Greer, Kenneth Portier:
Get Online Support, Feel Better - Sentiment Analysis and Dynamics in an Online Cancer Survivor Community. 274-281 - Amit Sharma, Dan Cosley:

Network-Centric Recommendation: Personalization with and in Social Networks. 282-289 - Marco Cristani, Giulia Paggetti, Alessandro Vinciarelli

, Loris Bazzani
, Gloria Menegaz
, Vittorio Murino
:
Towards Computational Proxemics: Inferring Social Relations from Interpersonal Distances. 290-297
Forum Analysis
- David I. Inouye

, Jugal K. Kalita:
Comparing Twitter Summarization Algorithms for Multiple Post Summaries. 298-306 - Daniele Quercia, Jonathan Ellis, Licia Capra, Jon Crowcroft

:
In the Mood for Being Influential on Twitter. 307-314 - Matthew Rowe, Sofia Angeletou, Harith Alani

:
Anticipating Discussion Activity on Community Forums. 315-322 - Wei Cheng, Xiaochuan Ni, Jian-Tao Sun, Xiaoming Jin, Hye-Chung Kum, Xiang Zhang, Wei Wang

:
Measuring Opinion Relevance in Latent Topic Space. 323-330 - David A. Huffaker, ChunYuen Teng, Matthew P. Simmons, Liuling Gong, Lada A. Adamic:

Group Membership and Diffusion in Virtual Worlds. 331-338 - Juan Lang, Shyhtsun Felix Wu:

Anti-preferential Attachment: If I Follow You, Will You Follow Me? 339-346 - Chih-Chun Chen, Camille Roth:

The Role of (Non-)Conformism in Rating Platforms. 347-353 - Eduarda Mendes Rodrigues, Natasa Milic-Frayling, Marc A. Smith, Ben Shneiderman, Derek L. Hansen:

Group-in-a-Box Layout for Multi-faceted Analysis of Communities. 354-361
Modeling
- Quang Duong, Michael P. Wellman

, Satinder Singh:
Modeling Information Diffusion in Networks with Unobserved Links. 362-369 - Haifeng Zhao, William Kallander, Tometi Gbedema, Henric Johnson, Shyhtsun Felix Wu:

Read What You Trust: An Open Wiki Model Enhanced by Social Context. 370-379 - Noam Hazon

, Nilanjan Chakraborty, Katia P. Sycara:
Game Theoretic Modeling and Computational Analysis of N-Player Conflicts over Resources. 380-387 - Krishna Yeswanth Kamath, James Caverlee:

Expert-Driven Topical Classification of Short Message Streams. 388-393 - Sergej Sizov:

RESCOT: Reliable Scheduling of Social Computing Tasks. 394-401 - Christoph Stadtfeld, Andreas Geyer-Schulz, Otto Allmendinger:

The Influence of Distance, Time, and Communication Network Structures on the Choice of Communication Partners. 402-409 - Cindy Hui, Malik Magdon-Ismail, William A. Wallace, Mark K. Goldberg:

Aborting a Message Flowing through Social Communities. 410-417
Trust, Reputation, and Privacy
- Thomas M. DuBois, Jennifer Golbeck, Aravind Srinivasan:

Predicting Trust and Distrust in Social Networks. 418-424 - Yuhong Liu, Yan Sun, Ting Yu:

Defending Multiple-User-Multiple-Target Attacks in Online Reputation Systems. 425-434 - Kevin McNally, Michael P. O'Mahony

, Barry Smyth:
Models of Web Page Reputation in Social Search. 435-442 - Na Li, Nan Zhang, Sajal K. Das

:
Relationship Privacy Preservation in Publishing Online Social Networks. 443-450 - Nicholas Violi, Jennifer Golbeck, Kan-Leung Cheng, Ugur Kuter:

Caretaker: A Social Game for Studying Trust Dynamics. 451-456 - Ho Keung Tsoi, Li Chen:

From Privacy Concern to Uses of Social Network Sites: A Cultural Comparison via User Survey. 457-464
SocialCom Poster Session
- Munmun De Choudhury:

Tie Formation on Twitter: Homophily and Structure of Egocentric Networks. 465-470 - Hideyuki Koto, Hajime Nakamura, Masaki Aida:

Two-Layered Structure of Social Network Revealed by Data Analysis of Telecommunciation Services. 471-476 - Paridhi Jain, Tiago Rodrigues, Gabriel Magno, Ponnurangam Kumaraguru, Virgílio A. F. Almeida:

Cross-Pollination of Information in Online Social Media: A Case Study on Popular Social Networks. 477-482 - David García

, Frank Schweitzer
:
Emotions in Product Reviews-Empirics and Models. 483-488 - Kazem Jahanbakhsh, Valerie King, Gholamali C. Shoja:

Empirical Comparison of Information Spreading Algorithms in the Presence of 1-Whiskers. 489-492 - Moonam Ko, Hakim Touati, Mohamed Shehab

:
Enabling Cross-Site Content Sharing between Social Networks. 493-496 - Behnam Hajian, Tony White:

Modelling Influence in a Social Network: Metrics and Evaluation. 497-500 - Christopher B. Schenk, Douglas C. Sicker

:
Finding Event-Specific Influencers in Dynamic Social Networks. 501-504 - Andrew Messenger, Jon Whittle:

Recommendations Based on User-Generated Comments in Social Media. 505-508 - Daqing Zhang, Zhu Wang

, Bin Guo, Xingshe Zhou, Vaskar Raychoudhury:
A Dynamic Community Creation Mechanism in Opportunistic Mobile Social Networks. 509-514 - Santi Phithakkitnukoon

, Francesco Calabrese, Zbigniew Smoreda
, Carlo Ratti:
Out of Sight Out of Mind-How Our Mobile Social Network Changes during Migration. 515-520 - Abhijit Bendale, Kevin Chiu, Kshitij Marwah, Ramesh Raskar:

VisionBlocks: A Social Computer Vision Framework. 521-526 - Alvin Chin, Hao Wang, Bin Xu, Ke Zhang, Hao Wang, Lijun Zhu:

Connecting People in the Workplace through Ephemeral Social Networks. 527-530 - Charalampos Chelmis, Viktor K. Prasanna:

Social Networking Analysis: A State of the Art and the Effect of Semantics. 531-536 - Jerzy Surma, Anna Furmanek:

Data Mining in On-Line Social Network for Marketing Response Analysis. 537-540 - Alana Platt, Cynthia Hood, Levi Citrin:

From Earthquakes to "#morecowbell": Identifying Sub-topics in Social Network Communications. 541-544 - Jung Sun Oh, Wei Jeng:

Groups in Academic Social Networking Services-An Exploration of Their Potential as a Platform for Multi-disciplinary Collaboration. 545-548 - Udayan Khurana, Viet-An Nguyen, Hsueh-Chien Cheng, Jae-wook Ahn, Xi Stephen Chen, Ben Shneiderman:

Visual Analysis of Temporal Trends in Social Networks Using Edge Color Coding and Metric Timelines. 549-554 - Daniel S. Farenzena, Ricardo M. Araújo, Luís C. Lamb

:
Collaboration Emergence in Social Networks with Informational Natural Selection. 555-559 - Fa-Hsien Li, Cheng-Te Li, Man-Kwan Shan:

Labeled Influence Maximization in Social Networks for Target Marketing. 560-563 - Whitman Richards:

Social Network Models. 564-567 - Xiaoling Sun, Jasleen Kaur

, Lino Possamai, Filippo Menczer:
Detecting Ambiguous Author Names in Crowdsourced Scholarly Data. 568-571 - Liu Yang, Vinod Ganapathy, Liviu Iftode:

Enhancing Mobile Malware Detection with Social Collaboration. 572-576 - Rushed Kanawati:

LICOD: Leaders Identification for Community Detection in Complex Networks. 577-582 - Sava Stakic, Srdjan Stakic:

Design Issues in Minimizing Infrastructure Requirements of Mobile Social Software Introduction System. 583-586 - Keren Jin, Jiafeng Zhu, Guangbin Fan:

MET: Multi-party E-Commerce Transaction Model. 587-590 - Eve Powell, Felesia Stukes, Tiffany Barnes, Heather Richter Lipford:

Snag'em: Creating Community Connections through Games. 591-594 - Byoungoh Kim, Gonzalo Huerta Cánepa, Dongman Lee:

Urban Radar: An Enabler for Place-Aware Spontaneous Interactions. 595-598 - Fadoua Ouamani

, Narjès Bellamine Ben Saoud
, Henda Hajjami Ben Ghézala
:
Towards a Generic Socio-cultural Profile for Collaborative Environments. 599-602 - Xuning Tang, Christopher C. Yang:

Dynamic Community Detection with Temporal Dirichlet Process. 603-608 - João Laranjeira, Goreti Marreiros

, Carlos Filipe Freitas, Ricardo Santos
, João Carneiro, Carlos Ramos
:
A Proposed Model to Include Social and Emotional Context in a Group Idea Generation Support System. 609-612 - Juan Lorenzo Hagad, Roberto Sebastian Legaspi, Masayuki Numao, Merlin Suarez

:
Predicting Levels of Rapport in Dyadic Interactions through Automatic Detection of Posture and Posture Congruence. 613-616 - Kyong Jin Shim

, Kuo-Wei Hsu, Samarth Damania, Colin DeLong, Jaideep Srivastava
:
An Exploratory Study of Player and Team Performance in Multiplayer First-Person-Shooter Games. 617-620 - Chamari Priyange Edirisinghe, Adrian David Cheok

, Ryohei Nakatsu, Johannes Widodo
:
Exploring the Spatiality of Networked Social Media as the Third Space. 621-624 - Vincent A. Traag

, Arnaud Browet, Francesco Calabrese, Frédéric Morlot:
Social Event Detection in Massive Mobile Phone Data Using Probabilistic Location Inference. 625-628 - Iftekhar Ahmed, Channing Brown, Andrew Pilny, Y. Dora Cai, Yannick Atouba Ada, Marshall Scott Poole:

Identification of Groups in Online Environments: The Twist and Turns of Grouping Groups. 629-632 - Zinovia I. Alepidou, Konstantinos N. Vavliakis, Pericles A. Mitkas:

A Semantic Tag Recommendation Framework for Collaborative Tagging Systems. 633-636 - Lily Tran, Manuel Cebrián

, Coco Krumme, Alex Pentland:
Social Distance Drives the Convergence of Preferences in an Online Music Sharing Network. 637-640 - Michael Brennan, Rachel Greenstadt:

Coalescing Twitter Trends: The Under-Utilization of Machine Learning in Social Media. 641-646 - Nisheeth Srivastava, Paul R. Schrater:

Cognitive Efficiency as a Causal Mechanism for Social Preferences. 647-650 - Justus F. M. Broß, Patrick Schilf, Maximilian Jenders, Christoph Meinel:

Visualizing the Blogosphere with BlogConnect. 651-656 - Pramod Divakarmurthy, Pooja Biswas, Ronaldo Menezes

:
A Temporal Analysis of Geographical Distances in Computer Science Collaborations. 657-660 - Karthik Subbian, Prem Melville:

Supervised Rank Aggregation for Predicting Influencers in Twitter. 661-665 - Siddhartha Bhattacharyya, Stellan Ohlsson:

How Network Structure Affects Social Creativity. 666-671 - Philipp Berger, Patrick Hennig, Justus Bross, Christoph Meinel:

Mapping the Blogosphere-Towards a Universal and Scalable Blog-Crawler. 672-677 - Anneli Avatare Nöu, Marie Sjölinder:

Live Broadcasting-The Feeling of Presence and Social Interaction. 678-683 - Shaun Lichter, Terry L. Friesz

, Christopher Griffin
:
Link Bias in Network Formation Games. 684-687 - Justin Zhan, Nadia M. Jones, Michael D. Purnell:

Top-K Algorithm for Recommendation in Social Networking Kingdoms. 688-694 - Justin Zhan, Xing Fang:

Anomaly Detection in Social-Economic Computing. 695-703 - Su Yang, Wenbin Zhou:

Anomaly Detection on Collective Moving Patterns: Manifold Learning Based Analysis of Traffic Streams. 704-707 - Hyung-Jun Yim, Yun-Young Hwang, Kyu-Chul Lee

:
Task-Based Services Composition for Ubiquitous Computing. 708-711 - Derek Foster

, Ben Kirman, Conor Linehan
, Shaun W. Lawson, Daniel Mills
, Sarah Ellis, Helen Zulch:
"I Can Haz Emoshuns?"-Understanding Anthropomorphosis of Cats among Internet Users. 712-715 - Kshanti A. Greene, Dan Thomsen, Pietro Michelucci

:
Exploration in Massively Collaborative Problem Solving. 716-719 - Tiffany Ng, Ou Jie Zhao, Dan Cosley:

pieTime: Visualizing Communication Patterns. 720-723 - Róbert Sumi, Taha Yasseri

, András Rung, András Kornai
, János Kertész:
Edit Wars in Wikipedia. 724-727 - Liyue Zhao, Gita Sukthankar, Rahul Sukthankar:

Incremental Relabeling for Active Learning with Noisy Crowdsourced Annotations. 728-733 - Thomas Clay Templeton, Kenneth R. Fleischmann, Jordan L. Boyd-Graber:

Simulating Audiences: Automating Analysis of Values, Attitudes, and Sentiment. 734-737 - Christiane Moser, Verena Fuchsberger

, Katja Neureiter, Wolfgang Sellner, Manfred Tscheligi
:
Elderly's Social Presence Supported by ICTs: Investigating User Requirements for Social Presence. 738-741 - Georg Groh, Christoph Fuchs, Alexander Lehmann:

Combining Evidence for Social Situation Detection. 742-747 - Eunice E. Santos, Eugene Santos Jr., John Korah, Jeremy E. Thompson

, Keum Joo Kim, Riya George, Qi Gu, Jacob C. Jurmain, Suresh Subramanian
, John Thomas Wilkinson:
Intent-Driven Behavioral Modeling during Cross-Border Epidemics. 748-755 - Malik Magdon-Ismail, Jonathan T. Purnell:

SSDE-Cluster: Fast Overlapping Clustering of Networks Using Sampled Spectral Distance Embedding and GMMs. 756-759 - Nicholas Violi, Ben Shneiderman, Art Hanson, P. J. Rey:

Motivation for Participation in Online Neighborhood Watch Communities: An Empirical Study Involving Invitation Letters. 760-765 - Man-Ching Yuen, Irwin King, Kwong-Sak Leung:

A Survey of Crowdsourcing Systems. 766-773 - Christopher C. Yang, Xuning Tang, Jia Huang, Jennifer B. Unger

:
A Study of Social Interactions in Online Health Communities. 774-779 - Mark K. Goldberg, Malik Magdon-Ismail, Srinivas Nambirajan, James Thompson:

Tracking and Predicting Evolution of Social Communities. 780-783 - Gundeep Singh Bindra:

Masquerading as a Trustworthy Entity through Portable Document File (PDF) Format. 784-789 - Jan Hauffa

, Gottlieb Bossert, Nadja Richter, Florian Wolf, Nora Liesenfeld, Georg Groh:
Beyond FOAF: Challenges in Characterizing Social Relations. 790-795 - Chjan C. Lim:

Rational Choice and Barriers to Exponential Complexity in Social Optimization Computations under Uncertainty. 796-799 - Yiftach Nagar:

Beyond the Human-Computation Metaphor. 800-805 - Taehyun Kim, Gonzalo Huerta Cánepa, Jongheon Park, Soon J. Hyun, Dongman Lee:

What's Happening: Finding Spontaneous User Clusters Nearby Using Twitter. 806-809 - Irena Pletikosa Cvijikj, Erica Dubach Spiegler, Florian Michahelles:

The Effect of Post Type, Category and Posting Day on User Interaction Level on Facebook. 810-813 - Tomoaki Akitomi, Koji Ara, Jun-ichiro Watanabe, Kazuo Yano:

Generic Model of Activity-Level in Workplace Communication. 814-819 - Jenq-Haur Wang, Chi-Ching Lee:

Unsupervised Opinion Phrase Extraction and Rating in Chinese Blog Posts. 820-823 - Xi Wang, Gita Sukthankar:

Extracting Social Dimensions Using Fiedler Embedding. 824-829 - Alexei Sharpanskykh, Jan Treur:

Group Abstraction for Large-Scale Agent-Based Social Diffusion Models. 830-837 - Swarup Chandra, Latifur Khan

, Fahad Bin Muhaya:
Estimating Twitter User Location Using Social Interactions-A Content Based Approach. 838-843 - Zhenmei Liao, Su Yang, Jianning Liang:

Discovering Collective Mobility Patterns. 844-847 - Alexei Sharpanskykh, Brian R. Spisak

:
An Agent-Based Evolutionary Model of Leadership. 848-855 - Georg Groh, Stefan Birnkammerer:

Privacy and Information Markets: Controlling Information Flows in Decentralized Social Networking. 856-861 - Po-Wah Yau, Allan Tomlinson:

Towards Privacy in a Context-Aware Social Network Based Recommendation System. 862-865 - Lizzie Coles-Kemp, Elahe Kani-Zabihi

:
Practice Makes Perfect: Motivating Confident Privacy Protection Practices. 866-871 - Stefano Braghin

, Vincenzo Iovino
, Giuseppe Persiano, Alberto Trombetta
:
Secure and Policy-Private Resource Sharing in an Online Social Network. 872-875 - Piotr Kozikowski, Georg Groh:

Inferring Profile Elements from Publicly Available Social Network Data. 876-881 - Muhammad Aurangzeb Ahmad, Iftekhar Ahmed, Jaideep Srivastava

, Marshall Scott Poole:
Trust Me, I'm an Expert: Trust, Homophily and Expertise in MMOs. 882-887 - Thang N. Dinh

, My T. Thai:
Finding Community Structure with Performance Guarantees in Scale-Free Networks. 888-891 - Daniel Compton, J. A. Hamilton Jr.:

An Examination of the Techniques and Implications of the Crowd-Sourced Collection of Forensic Data. 892-895 - Jacopo Staiano

, Bruno Lepri, Kyriaki Kalimeri
, Nicu Sebe
, Fabio Pianesi:
Contextual Modeling of Personality States' Dynamics in Face-to-Face Interactions. 896-899 - Pierre St. Juste, David Wolinsky, P. Oscar Boykin, Renato J. O. Figueiredo

:
Litter: A Lightweight Peer-to-Peer Microblogging Service. 900-903 - Amit Rechavi, Sheizaf Rafaeli:

Not All Is Gold That Glitters: Response Time & Satisfaction Rates in Yahoo! Answers. 904-909 - Scott Piao

, Jon Whittle:
A Feasibility Study on Extracting Twitter Users' Interests Using NLP Tools for Serendipitous Connections. 910-915
PASSAT 2011
Privacy
- Jannik Dreier, Florian Kerschbaum:

Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation. 916-924 - Marina Blanton:

Achieving Full Security in Privacy-Preserving Data Mining. 925-934 - Bastian Könings, David Piendl, Florian Schaub

, Michael Weber:
PrivacyJudge: Effective Privacy Controls for Online Published Information. 935-941 - Yang Wang, Armen Aghasaryan, Arvind Shrihari, David Pergament, Guy-Bertrand Kamga, Stéphane Betgé-Brezetz:

Intelligent Reactive Access Control for Moving User Data. 942-950 - Yuan Hong

, Jaideep Vaidya, Haibing Lu, Basit Shafiq:
Privacy-Preserving Tabu Search for Distributed Graph Coloring. 951-958 - Madan Oberoi, Pramod Jagtap, Anupam Joshi

, Tim Finin, Lalana Kagal:
Information Integration and Analysis: A Semantic Approach to Privacy. 959-965 - Dennis G. Kafura, Denis Gracanin

, Manuel A. Pérez-Quiñones
, Tom DeHart, Sherley Codio:
An Approach to Community-Oriented Email Privacy. 966-973 - Prima Chairunnanda, Nam Pham, Urs Hengartner:

Privacy: Gone with the Typing! Identifying Web Users by Their Typing Patterns. 974-980 - Mehmet Sayal, Lisa Singh:

Privately Detecting Pairwise Correlations in Distributed Time Series. 981-987 - Barbara Carminati

, Elena Ferrari
, Michele Guglielmi:
Secure Information Sharing on Support of Emergency Management. 988-995 - Pawel Jurczyk, Li Xiong:

Information Sharing across Private Databases: Secure Union Revisited. 996-1003
Trust and Risk
- Kevin Xuhua Ouyang, Binod Vaidya, Dimitrios Makrakis:

A Probabilistic-Based Trust Evaluation Model Using Hidden Markov Models and Bonus Malus Systems. 1004-1011 - Billy Lau, Atul Prakash

, Venkatanathan Annamalai:
Accessing Trusted Web Sites from Low-Integrity Systems without End-Host Snooping. 1012-1019 - Katharine Chang, Xinwen Zhang, Guoqiang Wang, Kang G. Shin:

TGIS: Booting Trust for Secure Information Sharing in Dynamic Group Collaborations. 1020-1025
Security
- Sujit Sanjeev, Jatin Lodhia, Raghunathan Srinivasan, Partha Dasgupta:

Protecting Cryptographic Keys on Client Platforms Using Virtualization and Raw Disk Image Access. 1026-1032 - Giovanni Russello, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich:

YAASE: Yet Another Android Security Extension. 1033-1040 - Markus Gruber, Florian Fankhauser, Stefan Taber, Christian Schanes, Thomas Grechenig:

Security Status of VoIP Based on the Observation of Real-World Attacks on a Honeynet. 1041-1047 - Raghunathan Srinivasan, Partha Dasgupta, Tushar Gohad:

Software Based Remote Attestation for OS Kernel and User Applications. 1048-1055 - Belal Amro

, Albert Levi
, Yücel Saygin:
CoRPPS: Collusion Resistant Pseudonym Providing System. 1056-1063 - Dipankar Dasgupta, Md. Moshiur Rahman:

Estimating Security Coverage for Cloud Services. 1064-1071
Web Assurance
- Joe Pato, Sharon Paradesi, Ian Jacobi, Fuming Shih, Sam Wang:

Aintno: Demonstration of Information Accountability on the Web. 1072-1080 - Anna Cinzia Squicciarini

, Christopher Griffin
, Smitha Sundareswaran:
Towards a Game Theoretical Model for Identity Validation in Social Network Sites. 1081-1088 - Lei Liu, Xinwen Zhang, Songqing Chen:

Botnet with Browser Extensions. 1089-1094 - Nidal Khoury, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:

An Analysis of Black-Box Web Application Security Scanners against Stored SQL Injection. 1095-1101 - Pallabi Parveen, Jonathan Evans, Bhavani Thuraisingham, Kevin W. Hamlen, Latifur Khan

:
Insider Threat Detection Using Stream Mining and Graph Mining. 1102-1110 - Frédéric Prost:

Enforcing Dynamic Interference Policy. 1111-1118 - Ibidokun Emmanuel Tope, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:

Performance and Scalability Evaluation of Oracle VM Server Software Virtualization in a 64 Bit Linux Environment. 1119-1124 - Ayodele Oluwaseun Ibidapo, Pavol Zavarsky, Dale Lindskog, Ron Ruhl:

An Analysis of CVSS v2 Environmental Scoring. 1125-1130 - Yikan Chen, David Evans

:
Auditing Information Leakage for Distance Metrics. 1131-1140
PASSAT Poster Session
- Reza Samavi, Mariano P. Consens

, Thodoros Topaloglou:
Privacy Goals and Settings Mediator Model for PHRs. 1141-1146 - Hagen Stübing, Marco Pfalzgraf, Sorin A. Huss:

A Decentralized Group Privacy Protocol for Vehicular Networks. 1147-1154 - Pauline Anthonysamy, Awais Rashid

, Phil Greenwood:
Do the Privacy Policies Reflect the Privacy Controls on Social Networks? 1155-1158 - Amir Herzberg

, Ely Porat, Nir Soffer, Erez Waisbard:
Camouflaged Private Communication. 1159-1162 - Justin Zhan, Luis Cabrera, Gasim Osman, Ronak Shah:

Using Private Matching for Securely Querying Genomic Sequences. 1163-1168 - Ayan Acharya, Eduardo R. Hruschka

, Joydeep Ghosh:
A Privacy-Aware Bayesian Approach for Combining Classifier and Cluster Ensembles. 1169-1172 - Delfina Malandrino

, Vittorio Scarano
:
Supportive, Comprehensive and Improved Privacy Protection for Web Browsing. 1173-1176 - Dalal Ahmed Al-Arayed, João Pedro Sousa:

TISS-loc: Towards User Control of Privacy in Location Disclosure. 1177-1184 - Marina Blanton

, Yihua Zhang, Keith B. Frikken:
Secure and Verifiable Outsourcing of Large-Scale Biometric Computations. 1185-1191 - Mozhgan Tavakolifard:

Conditional Trust Adjustment and Initialization. 1192-1195 - Wagner Medeiros dos Santos, Ruy J. G. B. de Queiroz:

Preserving Vote Secrecy in End-to-End Verifiable Voting Systems. 1196-1201 - Sandeep Varma Nadimpalli

, Valli Kumari Vatsavayi
:
BM (Break-Merge): An Elegant Approach for Privacy Preserving Data Publishing. 1202-1207 - Shan Chen, Mary-Anne Williams

:
An Ontological Study of Data Purpose for Privacy Policy Enforcement. 1208-1213 - Nihel Ben Youssef, Adel Bouhoula

:
Systematic Deployment of Network Security Policy in Centralized and Distributed Firewalls. 1214-1219 - Siew Yong, Dale Lindskog, Ron Ruhl, Pavol Zavarsky:

Risk Mitigation Strategies for Mobile Wi-Fi Robot Toys from Online Pedophiles. 1220-1223 - Wei Jiang, Bharath K. Samanthula:

A Secure and Distributed Framework to Identify and Share Needed Information. 1224-1230 - Wolfgang Boehmer:

Dynamic Systems Approach to Analyzing Event Risks and Behavioral Risks with Game Theory. 1231-1238 - Hidehito Gomi:

Access Control Model and Design for Delegation Using Authorization Tokens. 1239-1242 - Hiroyuki Sato:

A New Formula of Security Risk Analysis That Takes Risk Improvement Factor into Account. 1243-1248 - Faisal T. Ammari, Joan Lu

, Maher Abur-rous:
Intelligent XML Tag Classification Techniques for XML Encryption Improvement. 1249-1252 - Amer Aljaedi

, Dale Lindskog, Pavol Zavarsky, Ron Ruhl, Fares Almari:
Comparative Analysis of Volatile Memory Forensics: Live Response vs. Memory Imaging. 1253-1258 - Narges Shahgholi, Mehran Mohsenzadeh

, Mir Ali Seyyedi, Saleh Hafez Qorani:
A New SOA Security Framework Defending Web Services against WSDL Attacks. 1259-1262 - Bonnie Zhu, Shankar Sastry:

Revisit Dynamic ARIMA Based Anomaly Detection. 1263-1268 - Boyan Chen, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:

A Study of the Effectiveness of CSRF Guard. 1269-1272 - David C. Edwards, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Shaun Aghili:

E-Government System Security Model (eGSSM): A Multidimensional, Risk Based Approach to E-Government. 1273-1277 - Xun Wang, Mary-Anne Williams

:
Risk, Uncertainty and Possible Worlds. 1278-1283 - Justin Zhan, Xing Fang:

A Novel Trust Computing System for Social Networks. 1284-1289 - Yung-Yu Chang, Pavol Zavarsky, Ron Ruhl, Dale Lindskog:

Trend Analysis of the CVE for Software Vulnerability Management. 1290-1293
Workshop on Security and Privacy in Social Networks (SPSN 2011)
- Hye-Chung Kum, Stanley C. Ahalt:

Decoupled Data for Privacy Preserving Record Linkage with Error Management. 1294-1301 - Oleksandr Bodriagov, Sonja Buchegger:

Encryption for Peer-to-Peer Social Networks. 1302-1309 - Patrik Bichsel, Jan Camenisch, Mario Verdicchio:

Recognizing Your Digital Friends. 1310-1313 - Christopher G. Harris

:
Dirty Deeds Done Dirt Cheap: A Darker Side to Crowdsourcing. 1314-1317 - Fergal Reid, Martin Harrigan

:
An Analysis of Anonymity in the Bitcoin System. 1318-1326 - Michael Netter, Sebastian Herbst, Günther Pernul:

Analyzing Privacy in Social Networks-An Interdisciplinary Approach. 1327-1334 - Muhammad Adeel, Laurissa N. Tokarchuk:

Analysis of Mobile P2P Malware Detection Framework through Cabir & Commwarrior Families. 1335-1343 - Ki Jung Lee, Il-Yeol Song:

Modeling and Analyzing User Behavior of Privacy Management on Online Social Network: Research in Progress. 1344-1351 - Ahmad Kamran Malik, Schahram Dustdar

:
Sharing and Privacy-Aware RBAC in Online Social Networks. 1352-1355
Workshop on Modeling Social Media, User Interface Modeling in Social Media (MSM 2011)
- Florian Lemmerich, Martin Atzmueller:

Modeling Location-Based Profiles of Social Image Media Using Explorative Pattern Mining. 1356-1363 - Mohamed Bourimi

, Ricardo Tesoriero
, Pedro González Villanueva, Fatih Karatas, Philipp Schwarte:
Privacy and Security in Multi-modal User Interface Modeling for Social Media. 1364-1371 - Elenna R. Dugundji

, Ate Poorthuis, Michiel van Meeteren
:
Modeling User Behavior in Adoption and Diffusion of Twitter Clients. 1372-1379 - Victoria Lai, Christopher Rajashekar, William Rand:

Comparing Social Tags to Microblogs. 1380-1383 - Enkh-Amgalan Baatarjav, Ram Dantu:

Current and Future Trends in Social Media. 1384-1385 - Hesham Allam, James Blustein

, Louise Spiteri, Michael Bliemel
:
Enhancing Exploratory Search with Hedonic Browsing Using Social Tagging Tools. 1386-1389 - Else Nygren:

Simulation of User Participation and Interaction in Online Discussion Groups. 1390-1397
Workshop on Social Object Networks (SON 2011)
- David De Roure

, Sean Bechhofer
, Carole A. Goble
, David R. Newman:
Scientific Social Objects: The Social Objects and Multidimensional Network of the myExperiment Website. 1398-1402 - Lei Li

, Tong Sun, Tao Li:
Personal Social Screen-A Dynamic Privacy Assignment System for Social Sharing in Complex Social Object Networks. 1403-1408 - Dan Chalmers, Simon Fleming, Ian Wakeman

, Des Watson:
Rhythms in Twitter. 1409-1414 - Nicolas Marie, Fabien Gandon

:
Social Objects Description and Recommendation in Multidimensional Social Networks: OCSO Ontology and Semantic Spreading Activation. 1415-1420 - Teshome Feyessa, Marwan Bikdash, Gary L. Lebby:

Node-Pair Feature Extraction for Link Prediction. 1421-1424
Workshop on Social Connections in the Urban Space (SCUS 2011)
- Thomas Couronné

, Ana-Maria Olteanu-Raimond, Zbigniew Smoreda
:
Urban Mobility: Velocity and Uncertainty in Mobile Phone Data. 1425-1430 - Hiroaki Sengoku, Yuki Akiyama, Ryosuke Shibasaki:

Time-Series Monitoring Method of Commercial Accumulations Using Digital Yellow Page Data. 1431-1436 - David Boardman, Federico Casalegno, Steve Pomeroy:

Locast Civic Media: Extending Civic Engagement Boundaries through Mobile Media and Hyper-Local Conversations. 1437-1442 - Kyungsik Han

, Eric A. Graham
, Dylan Vassallo, Deborah Estrin:
Enhancing Motivation in a Mobile Participatory Sensing Project through Gaming. 1443-1448 - Ciaran Owens, Stephen A. Brewster:

Discovering and Classifying Errors in Way Finding. 1449-1454 - Armando Bazzani, Bruno Giorgini, Riccardo Gallotti

, Luca Giovannini, Monica Marchioni, Sandro Rambaldi
:
Towards Congestion Detection in Transportation Networks Using GPS Data. 1455-1459
Workshop on Social Behavioral Analysis and Behavioral Change (SBABC 2011)
- Sebastian Feese, Amir Muaremi, Bert Arnrich

, Gerhard Tröster, Bertolt Meyer, Klaus Jonas:
Discriminating Individually Considerate and Authoritarian Leaders by Speech Activity Cues. 1460-1465 - Giovanna Varni, Gualtiero Volpe

, Barbara Mazzarino:
Towards a Social Retrieval of Music Content. 1466-1473 - Masaru Honjo, Toru Hasegawa, Teruyuki Hasegawa, Koji Mishima, Tatsuya Suda, Toshikazu Yoshida:

A Framework to Identify Relationships among Students in School Bullying Using Digital Communication Media. 1474-1479 - Hikaru Yamamoto, Naohiro Matsumura:

The Effect of Relational Context on Personal Influence. 1480-1485 - Marco Guerini

, Carlo Strapparava:
Persuasion and Social Contagion. 1486-1489

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














