Title |
Speakers |
Summary |
Topic Types |
Learning to Read the Web |
Tom M. Mitchell
|
One of the great technical challenges in big data is to construct computer systems that ... |
|
Understanding Behavior by Mining Logs from Online Social Environments |
Jaideep Srivastava
|
Observation and analysis of a phenomenon at unprecedented levels of granularity not only furthers our ... |
|
Computational Challenges of Next-Generation Genome Sequence Analysis |
Steven L. Salzberg
|
Next-generation sequencing (NGS) technology allows us to peer inside the cell in exquisite detail, revealing ... |
|
Sociometric Methods for Relevancy Analysis of Long Tail Science Data |
Justin Zhan
,
Arcot Rajasekar
,
Sharlini Sankaran
,
Howard Lander
,
Tom Carsey
,
Jonathan Crabtree
,
Merce Crosas
,
Gary King
,
Hye-chung Kum
|
N/A |
|
Scaling Deep Social Feeds at Pinterest |
Varun Sharma
,
Jeremy Carroll
,
Abhi Khune
|
N/A |
|
Understanding Information Credibility on Twitter |
Byungkyu Kang
,
Sibel Adali
,
Sujoy Sikdar
,
John O'donovan
,
Tobias Hollerer
|
N/A |
|
MultiScale Modeling of Islamic Organizations in UK |
Nyunsu Kim
,
Sukru Tikves
,
Zheng Wang
,
Jonathan Githens-mazer
,
Hasan Davulcu
|
N/A |
|
Incongruity Versus Incongruity Resolution |
Jaideep Srivastava
,
Amogh Mahapatra
|
N/A |
|
Bayesian Security Games for Controlling Contagion |
Milind Tambe
,
Jason Tsai
,
Yundi Qian
,
Yevgeniy Vorobeychik
,
Christopher Kiekintveld
|
N/A |
|
Trending Topics on Twitter Improve the Prediction of Google Hot Queries |
Federica Giummolè
,
Salvatore Orlando
,
Gabriele Tolomei
|
N/A |
|
The Effect of Caching on a Model of Content and Access Provider Revenues in Information-centric Networks |
George Kesidis
,
Fatih Kocak
,
Tuan-minh Pham
,
Serge Fdida
|
N/A |
|
Realizing Stock Market Crashes: Stochastic Cusp Catastrophe Model of Returns Under the Time-varying Volatility |
Jozef Baruník
,
Jiri Kukacka
|
N/A |
|
Model-Driven Development of Information Flow-Secure Systems with IFlow |
Kuzman Katkalov
,
Kurt Stenzel
,
Marian Borek
,
Wolfgang Reif
|
N/A |
|
How Increased Awareness Can Impact Attitudes and Behaviors toward Online Privacy Protection |
Delfina Malandrino
,
Vittorio Scarano
,
Raffaele Spinelli
|
N/A |
|
Using Stochastic Models Predict User Response in Social Media |
Kristina Lerman
,
Tad Hogg
,
Laura Smith
|
N/A |
|
Hoodsquare: Modeling and RecommendingNeighborhoods in Location-based Social Networks |
Anastasios Noulas
,
Salvatore Scellato
,
Cecilia Mascolo
,
Amy X. Zhang
|
N/A |
|
A Place-focused Model for Social Networks in Cities |
Anastasios Noulas
,
Cecilia Mascolo
,
Chloe Brown
,
Vincent Blondel
|
N/A |
|
Quantifying Social Influence in Epinions |
Akshay Patil
,
Golnaz Ghasemiesfeh
,
Roozbeh Ebrahimi
,
Jie Gao
|
N/A |
|
Privacy-Preserving Data Publishing Based On Utility Specification |
Weining Zhang
,
Hongwei Tian
|
N/A |
|
Does Love Change on Twitter? The Dynamics of Topical Conversations in Microblogging |
Victoria Lai
,
William Rand
|
N/A |
|
Gang Networks, Neighborhoods and Holidays: Spatiotemporal Patterns in Social Media |
Nibir Bora
,
Vladimir Zaytsev
,
Yu-han Chang
,
Rajiv Maheswaran
|
N/A |
|
Predictability of User Behavior in Social Media: Bottom-Up v. Top-Down Modeling |
David Darmon
,
William Rand
,
Jared Sylvester
,
Michelle Girvan
|
N/A |
|
Towards an Attribute Based Constraints Specification Language |
Ram Krishnan
,
Ravi Sandhu
,
Khalid Bijon
|
N/A |
|
On Measuring the Quality of a Network Community Structure |
Mingming Chen
,
Tommy Nguyen
,
Boleslaw Szymanski
|
N/A |
|
Direct Negative Opinions in Online Discussions |
Claudiu-cristian Musat
,
Boi Faltings
,
Philippe Roussille
|
N/A |
|
Multi-Tweet Summarization of Real-Time Events |
Muhammad Khan
,
Danushka Bollegala
,
Guangwen Liu
,
Kaoru Sezaki
|
N/A |
|
Delineating Real-Time Events by Identifying Relevant Tweets with Popular Discussion Points |
Muhammad Asif Khan
,
Danushka Bollegala
,
Guangwen Liu
,
Kaoru Sezaki
|
N/A |
|
SMAC: Subgraph Matching and Centrality in Huge Social Networks |
Noseong Park
,
Michael Ovelgönne
,
Vs Subrahmanian
|
N/A |
|
Bandit Algorithms for Social Network Queries |
Rami Puzis
,
Zahy Bnaya
,
Roni Stern
,
Ariel Felner
|
N/A |
|
Partitioning and Scaling Signed Bipartite Graphsfor Polarized Political Blogosphere |
Sedat Gokalp
,
Hasan Davulcu
,
M’hamed Temkit
,
I. Hakki Toroslu
|
N/A |
|
Predicting Spending Behavior using Socio-Mobile Features |
Bruno Lepri
,
Vivek Singh
,
Laura Freeman
,
Alex (sandy) Pentland
|
N/A |
|
Automatic Classification and Analysis of Interdisciplinary Fields in Computer Sciences |
Animesh Mukherjee
,
Tanmoy Chakraborty
,
Srijan Kumar
,
M Dastagiri Reddy
,
Suhansanu Kumar
,
Niloy Ganguly
|
N/A |
|
StackOverflow and GitHub: Associations Between Software Development and Crowdsourced Knowledge |
Vladimir Filkov
,
Bogdan Vasilescu
,
Alexander Serebrenik
|
N/A |
|
Children’s Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness |
Sencun Zhu
,
Heng Xu
,
Ying Chen
,
Yilu Zhou
|
N/A |
|
News and Sentiment Analysis of the EuropeanMarket with a Hybrid Expert Weighting Algorithm |
German G. Creamer
,
Yong Ren
,
Yasuaki Sakamoto
,
Jeffrey V. Nickerson
|
N/A |
|
Crawling Credible Online Medical Sentiments for Social Intelligence |
Ahmed Abbasi
,
Tianjun Fu
,
Daniel Zeng
,
Donald Adjeroh
|
N/A |
|
Parallel Overlapping Community Detection with SLPA |
Konstantin Kuzmin
,
S. Yousaf Shah
,
Boleslaw K. Szymanski
|
N/A |
|
Applications of Social Networks and Crowdsourcing for Disaster Management Improvement |
Liliya Besaleva
,
Alfred Weaver
|
N/A |
|
A Job Interview Simulation: Social Cue-based Interaction with a Virtual Character |
Ionut Damian
,
Tobias Baur
,
Patrick Gebhard
,
Kaska Porayska-pomsta
,
Elisabeth André
|
N/A |
|
Understanding how learning affects agreement process in social networks |
Suman kalyan Maity
,
Animesh Mukherjee
,
Abhishek Porwal
|
N/A |
|
The Role of Social Media in the Discussion of Controversial Topics |
Kristina Lerman
,
Laura Smith
,
Linhong Zhu
,
Zornitsa Kozareva
|
N/A |
|
Simulating Team Formation in Social Networks |
Nathaniel Dykhuis
,
Yu-han Chang
,
Paul Cohen
|
N/A |
|
Latent Interest-Group Discovery and Managementby Peer-to-Peer Online Social Networks |
George Kesidis
,
Jianping He
,
David Miller
|
N/A |
|
A Structure for Opinion in Social Domains |
Mostafa Karamibekr
,
Ali Akbar Ghorbani
|
N/A |
|
Finding Participants in a Chat: Authorship Attribution for Conversational Documents |
Giacomo Inches
,
Morgan Harvey
,
Fabio Crestani
|
N/A |
|
Spatio-Temporal Signal Recovery from Political Tweets in Indonesia |
Nyunsu Kim
,
Sedat Gokalp
,
Anisha Mazumder
,
Hasan Davulcu
,
Arun Das
,
Arunabha Sen
|
N/A |
|
Effect of vaccination strategies on the herd immunity of growing networks |
Mahendra Piraveenan
,
Shahadat Uddin
,
Gnanakumar Thedchanamoorthy
|
N/A |
|
Self-reported social network behavior:Accuracy predictors and implications for theprivacy paradox |
Alessandro Acquisti
,
Jessica Staddon
,
Kristen Lefevre
|
N/A |
|
Religious Politicians and Creative Photographers:Automatic User Categorization in Twitter |
Claudia Wagner
,
Sitaram Asur
,
Joshua Hailpern
|
N/A |
|
A Community Based Social Recommender Systemfor Individuals & Groups |
Maryam Fatemi
,
Laurissa Tokarchuk
|
N/A |
|
Twitter, Public Opinion, and the 2011 Nigerian Presidential Election |
Clay Fink
,
Nathan Bos
,
Alexander Perrone
,
Edwina Liu
,
Jonathon Kopecky
|
N/A |
|
Faster Clustering Coefficient Using Vertex Covers |
Oded Green
,
David A. Bader
|
N/A |
|
Modeling Attrition in Organizations From Email Communication |
Akshay Patil
,
Jie Gao
,
Juan Liu
,
Jianqiang Shen
,
Oliver Brdiczka
,
John Hanley
|
N/A |
|
Entity Matching in Online Social Networks |
Yuval Elovici
,
Michael Fire
,
Olga Peled
,
Lior Rokach
|
N/A |
|
A :) Is Worth a Thousand Words: How People Attach Sentiment to Emoticons and Words in Tweets |
Claudiu-cristian Musat
,
Marina Boia
,
Boi Faltings
,
Pearl Pu
|
N/A |
|
Twitter Sentiment Analysis: A Bootstrap Ensemble Framework |
Ahmed Abbasi
,
Ammar Hassan
,
Daniel Zeng
|
N/A |
|
Tracking Visitor Engagement in the Blogospherefor Leveraging Rankings |
Patrick Hennig
,
Philipp Berger
,
Christoph Meinel
,
Maria Graber
,
Jens Hildebrandt
,
Stefan Lehmann
,
Cathleen Ramson
|
N/A |
|
An Evaluation of the Effect of Spam on Twitter Trending Topics |
Louis Yu
,
Grant Stafford
|
N/A |
|
Friendship Prediction on Social Network Users |
Kuan-hsi Chen
,
Tyne Liang
|
N/A |
|
Evaluating the Performance of Social Networks of Sensors under Different Mobility Models |
Marcello Tomasini
,
Franco Zambonelli
,
Angelo Brayner
,
Ronaldo Menezes
|
N/A |
|
Automatic Event Scheduling in Mobile Social Network Communities |
Vaskar Raychoudhury
,
Ajay D. Kshemkalyani
,
Daqing Zhang
,
Jiannong Cao
,
Mohit Bakshi
,
Kanik Gupta
,
Vishal Mittal
,
Siddharth Maheshwari
|
N/A |
|
Risk Management in the Era of BYOD |
T.andrew Yang
,
Radu Vlas
,
Alan Yangm
,
Cristina Vlas
|
N/A |
|
On the Efficient Processing of Multilevel Secure Continuous Queries |
Indrakshi Ray
,
Xing Xie
,
Raman Adaikkalavan
|
N/A |
|
ACaaS: Access Control as a Service for IaaS Cloud |
Elena Ferrari
,
Gail-joon Ahn
,
Xinwen Zhang
,
Haiyong Xie
,
Ruoyu Wu
,
Barbara Carminati
,
Hadi Sharifi
,
Ngoc Hong Tran
|
N/A |
|
SmartPay: A lightweight protocol to enforce trust preferences in mobile Person-toPerson payments |
Elena Ferrari
,
Barbara Carminati
,
Ngoc Hong Tran
|
N/A |
|
Access Control Policy Extraction from Unconstrained Natural Language Text |
Laurie Williams
,
John Slankas
|
N/A |
|
A Conjunction Filter for Private Stream Search |
Michael Oehler
,
Dhananjay Phatak
|
N/A |
|
A Security Analysis of Two Commercial Browser and Cloud Based Password Managers |
Chuan Yue
,
Kun Sun
,
Rui Zhao
|
N/A |
|
Privacy Framework for Open Environments |
Afshan Samani
,
Adrian T. Beinkowski
,
Raafat Aburukba
,
Hamada H. Ghenniwa
|
N/A |
|
Measuring Inherent Privacy Concern and Desire for Privacy: A pilot survey study of an instrument to measure dispositional privacy concern |
Anthony Morton
|
N/A |
|
Managing Risk in Secure System: Antecedents to Requirement Engineers TrustAssumption Decisions |
Patrick Offor
|
N/A |
|
Preservation of Centrality Measures in Anonymized Social Networks |
Yasmeen Alufaisan
,
Alina Campan
|
N/A |
|
Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit |
Karen Scarfone
,
Vincent Hu
|
N/A |
|
Security Policy Refinement: High-Level Specification to Low-Level Implementation |
Xia Yang
,
Jim Alves-foss
|
N/A |
|
Enforcing Trust Preferences in Mobile Person-to-Person Payments |
Elena Ferrari
,
Barbara Carminati
,
Ngoc Hong Tran
|
N/A |
|
"I Like" - Analysing Interactions within Social Networks to Assert the Trustworthiness of Users, Sources and Content |
Owen Sacco
,
John G. Breslin
|
N/A |
|
An Analysis Grid for Privacy-related Properties ofSocial Network Systems |
Christophe Bidan
,
Regina Marin
,
Guillaume Piolle
|
N/A |
|
The Impact of Anonymity in Online Communities |
Sara Sood
,
Eli Omernick
|
N/A |
|
Bot Detection based on Social Interactions in MMORPGs |
Zoheb Borbora
,
Jaideep Srivastava
,
Jehwan Oh
,
Dhruv Sharma
|
N/A |
|
Access Control Policy Misconfiguration Detection in Online Social Networks |
Yousra Javed
,
Mohamed Shehab
|
N/A |
|
Event Driven Monitoring of Composite Services |
Muhammad Asim
,
Bo Zhou
,
David Llewellyn-jones
,
Qi Shi
,
Madjid Merabti
,
Brett Lempereur
|
N/A |
|
Preprocess Before You Build: Introducing a Framework for Privacy Requirements Engineering |
Dennis Kafura
,
Denis Gracanin
,
Peter J. Radics
|
N/A |
|
Understanding Site-Based Inference Potential forIdentifying Hidden Attributes |
Micah Sherr
,
Lisa Singh
,
Brad Moore
,
Yifang Wei
,
Adam Orshefsky
,
Hui Yang
|
N/A |
|
In Guards We Trust: Security and Privacy in Operating Systems revisited |
Michael Hanspach
,
Joerg Keller
|
N/A |
|
Information Security Risk Management in a World of Services |
Vincent Lalanne
,
Manuel Munier
,
Alban Gabillon
|
N/A |
|
Threat Modeling for Security Failure-Tolerant Requirements |
Michael Shin
,
Swetha Dorbala
,
Dongsoo Jang
|
N/A |
|
The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI |
Johannes Braun
,
Gregor Rynkowski
|
N/A |
|
Privacy Measurement for Social Network Actor Model |
Yong Wang
,
Raj Nepali
|
N/A |
|
Controlling Break-The-Glass Through Alignment |
Nicola Zannone
,
Arya Adriansyah
,
Boudewijn Van Dongen
|
N/A |
|
A PET evaluation framework for relational databases |
Hendrik Oberholzer
,
Sunday O Ojo
,
Oludayo Olugbara
|
N/A |
|
Maximizing Investigation Effectiveness in Digital Forensic Cases |
Ezhil Kalaimannan
,
Jatinder N.d. Gupta
,
Seong-moo Yoo
|
N/A |
|
A Semantic Framework for Content-based Access Controls |
Sharon Paradesi
,
Ilaria Liccardi
,
Lalana Kagal
,
Joe Pato
|
N/A |
|
Secure Execution Context Enforcement Framework based on Activity Detection on Data and Applications Hosted on Smart Devices |
Theo Dimitrakos
,
Yair Diaz-tellez
,
Eliane L. Bodanese
,
Fadiali El-moussa
|
N/A |
|
Abstracted architecture for Smart Grid privacyanalysis |
Jussi Laakkonen
,
Salla Annala
,
Pekka Jäppinen
|
N/A |
|
A Framework for Secure Service Composition |
Bo Zhou
,
Qi Shi
,
Madjid Merabti
,
Achim D. Brucker
,
Francesco Malmignati
|
N/A |
|
Towards A Framework for Privacy-Aware MobileCrowdsourcing |
Yang Wang
,
Yun Huang
,
Claudia Louis
|
N/A |
|
Effective Method for Promoting Viral Marketing in Microblog |
Xiang Li
,
Shaoyin Cheng
,
Wenlong Chen
,
Fan Jiang
|
N/A |
|
Exploring Image Virality in Google Plus |
Jacopo Staiano
,
Marco Guerini
,
Davide Albanese
|
N/A |
|
Comparing tag clustering algorithms for mining Twitter users’ interests |
Sandra Servia-rodríguez
,
Ana Fernández-vilas
,
Rebeca P. Díaz-redondo
,
José J. Pazosarias
|
N/A |
|
Towards Network Reduction on Big Data |
Justin Zhan
,
Xing Fang
,
Nicholas Koceja
|
N/A |
|
Composing Data Parallel Code for a SPARQL Graph Engine |
Vito Giovanni Castellana
,
Antonino Tumeo
,
Oreste Villa
,
David Haglin
,
John Feo
|
N/A |
|
Key Recovery Using Noised Secret Sharing with Discounts Over Large Clouds |
Sushil Jajodia
,
Witold Litwin
,
Thomas Schwarz
|
N/A |
|
An Empirical Comparison of Graph Databases |
Salim Jouili
,
Valentin Vansteenberghe
|
N/A |
|
imGraph: A distributed in-memory graph database |
Salim Jouili
,
Aldemar Reynaga
|
N/A |
|
Discovering Taxi Origin-Destination Hotspots Based on Functional Region Division |
Xuejin Wan
|
N/A |
|
A Dynamic Replication Mechanism to Reduce Response-Time of I/O Operations in HighPerformance Computing Clusters |
Ehsan Mousavi Khaneghah
,
Seyedeh Leili Mirtaheri
,
Lucio Grandinetti
,
Amir Saman Memaripour
,
Mohsen Sharifi
|
N/A |
|
Emissions abating technology adoption under the SO2 permit market: a social networks approach |
German G. Creamer
,
Bernardo Creamer
|
N/A |
|
Popularity Prediction of Social Multimedia Based on Concept Drift |
Shih-hong Shan
|
N/A |
|
Impact of a Non-linear Pay-Off Function on Pairwise Stable Collaborative Oligopolies |
Christopher Griffin
,
Shaun Lichter
,
Terry Friesz
|
N/A |
|
Rating Equity Funds against Return of Random Traders |
Ta-wei Hung
,
Mu-en Wu
,
Hsueh-i Lu
,
Jan-ming Ho
|
N/A |
|
A Dynamic Pricing Game in a Model of NewProduct Adoption with Social Influence |
Henry Thille
,
Monica Cojocaru
,
Edward W. Thommes
,
Dominic Nelson
,
Scott Greenhalgh
|
N/A |
|
Three Fiscal Policy Experiments in an Agent-Based Macroeconomic Model |
Carl Gustafson
|
N/A |
|
A Serious Game Based on a Public Goods Experiment |
Carlos Martinho
,
Rui Prada
,
M´arcia Baptista
,
Hugo Damas
,
Joana Dimas
,
Pedro A. Santos
,
Jorge Pe˜na
|
N/A |
|
FinancialCloud: Open Cloud Framework of Derivative Pricing |
Hsin-tsung Peng
,
Jan-ming Ho
,
William W.y. Hsu
,
Chih-hung Chen
,
Feipei Lai
|
N/A |
|
Happiness Recognition from Mobile Phone Data |
Bruno Lepri
,
Fabio Pianesi
,
Andrey Bogomolov
|
N/A |
|
Automatic Labeling of Training Data for Collecting Tweets for Ambiguous TV Program Titles |
Maike Erdmann
,
Erik Ward
,
Kazushi Ikeda
,
Gen Hattori
,
Chihiro Ono
,
Yasuhiro Takishima
|
N/A |
|
GeoEvents - An Interactive Tool to Analyze and Visualize Spatial Information from the Social Web |
Caroline Sabty
,
Martin Memmel
,
Slim Abdennadher
|
N/A |
|
Impact of Dynamic Corporate News Networks on Asset Return and Volatility |
German G. Creamer
,
Yong Ren
,
Jeffrey V. Nickerson
|
N/A |
|
K-partitioning of Signed or Weighted Bipartite Graphs |
Sedat Gokalp
,
Nurettin B. Omeroglu
,
Hasan Davulcu
,
I. Hakki Toroslu
|
N/A |
|
Support Vector Machine Based Detection of Drowsiness Using Minimum EEG Features |
Shaoda Yu
,
Peng Li
,
Honghuang Lin
,
Ehsan Rohani
,
Gwan Choi
,
Botang Shao
,
Qian Wang
|
N/A |
|
Finding Number of Clusters in a Gene Co-expression Network Using Independent Sets |
Harun Pirim
|
N/A |
|
Synthetic Biology Driven by Harnessing Forces of Disruptive Innovation |
Melvin Greer
,
Manuel Rodriguez-martinez
,
Jamie Seguel
|
N/A |
|
Classification of MRI images for Alzheimer’s disease detection |
Luis Javier Herrera
,
Ignacio Rojas
,
H. Pomares
,
A. Guillén
,
O. Valenzuela
,
O. Baños
|
N/A |
|
Presision Controlled Variable phase filter for Imaging type Two-dimentional Spectroscopic Tomography |
Pradeep Abeygunawardhana
,
Akira Nishiyama
,
Satoru Suzuki
,
And Ichirou Ishimaru
|
N/A |
|
Programmable Hardware based Short Read AlignerUsing Phred Quality Scores |
Yağmur Gök
,
Mahmut S. Sağıroğlu
,
Cem Ünsalan
,
Sezer Gören
|
N/A |
|
Conceptual Quantification of the Dynamicity of Longitudinal Social Networks |
Mahendra Piraveenan
,
Shahadat Uddin
,
Arif Khan
,
Babak Amiri
|
N/A |
|
Intelligent Systems to Autonomously Classify Several Arrhythmia UsingInformation from ECG |
Olga Valenzuela
,
H. Pomares
,
O. Baños
,
F. Rojas
,
L.j. Herrera
,
F. Ortuño
,
G. Ruiz
,
H. Tribak
,
I. Rojas
|
N/A |
|
State History Tree : an Incremental Disk-based Data Structure forVery Large Interval |
Data Alexander Montplaisir-g
,
Naser Ezzati
,
Florian Wininger
,
Michel Dagenais
|
N/A |
|
Ego-Centric Graphlets for Personality and Affective States Recognition |
Bruno Lepri
,
Jacopo Staiano
,
Fabio Pianesi
,
Stefano Teso
,
Andrea Passerini
|
N/A |
|
Minimizing Social Data Overload through Interest-Based Stream Filtering in a P2P Social Network |
Sayooran Nagulendra
,
Julita Vassileva Vassileva
|
N/A |
|
Social Network Based Recommendation Systems: A Short Survey |
Song Chen
,
Samuel Owusu
,
Lina Zhou
|
N/A |
|
Social Networks’ Facebook’ Statutes Updates Mining for Sentiment Classification |
Jalel Akaichi
|
N/A |
|
A pilot study about military user and information systems |
Harry D. Tunnell
|
N/A |
|
A Novel Group Recommendation Algorithm With Collaborative Filtering |
Yang Song
,
Haifeng Liu
,
Yu Shi
,
Hui Tian
|
N/A |
|
Analysis of Influential Features for Information Diffusion |
Shohei Usui
,
Fujio Toriumi
,
Takatsugu Hirayama
,
Kenji Mase
|
N/A |
|
Privacy and Social Networks: Is Concern a Valid Indicator of Intention and Behaviour? |
Thomas Hughes-roberts
|
N/A |
|
Study of Stock Prediction Based on Social Network |
Zheng Chen
,
Xiaoqing Du
|
N/A |
|
Inkling: An Executable Paper System for Scientific Applications |
Dennis G. Castleberry
,
Steven R. Brandt
,
Frank Löffler
|
N/A |
|
The Use of Social Context To Enhance Mobile Web Search Experience |
Nour Salama
,
Sherif Aly
,
Ahmed Rafea
|
N/A |
|
Effective Clusterization of Political Tweets using Kurtosis and Trending Time |
Hiroshi Itsuki
,
Hithoshi Matsubara
,
Kazunari Omi
,
And Kazuki Arita
|
N/A |
|
Analyzing Close Friend Interactions in Social Media |
Morgan Madeira
,
Anupam Joshi
|
N/A |
|
Efficiency and Trade Network Analysis of the Electricity Market: 1985-2005 |
German G. Creamer
,
Bernardo Creamer
|
N/A |
|
Fast Information Retrieval and Social NetworkMining via Cosine Similarity Upper Bound |
Weizhong Zhao
,
Venkata-swamy Martha
,
Gang Chen
,
Xiaowei Xu
|
N/A |
|
Synthesizing Social Media Data Using Information Morphing |
Kirk Ogaard
|
N/A |
|
Stock Market Manipulation Using Cyber AttacksTogether with Misinformation DisseminatedThrough Social Media |
Matti Mantere
|
N/A |
|
The Privacy Problem in Big Data Applications: An Empirical Study on Facebook |
Jerzy Surma
|
N/A |
|
Human Activity Recognition based on 3D Mesh MoSIFT Feature Descriptor |
Yue Ming
|
N/A |
|
Social Media Data Analytics Applied to Hurricane Sandy |
Han Dong
,
Shujia Zhou
,
Milton Halem
|
N/A |
|
Social Welfare and Inequality in a Networked Resource Game with Human Players |
Bowen Ni
,
Yu-han Chang
,
Rajiv Maheswaran
|
N/A |
|
Viral Opinion Spreading in Social Networks |
Igor Kanovsky
,
Omer Yaari
|
N/A |
|
Automatic Crowdsourcing-Based Classification of Marketing Messaging on Twitter |
Radu Machedon
,
William Rand
,
Yogesh Joshi
|
N/A |
|
Personalized Microblogs Corpus Recommendation based on Dynamic Users Interests |
Denis Gracanin
,
Shaymaa Khater
,
Hicham Elmongui
|
N/A |
|
Tournament-based Relative Preference Models for Trust Assessment in Social Networks |
Suratna Budalakoti
,
Suzanne Barber
|
N/A |
|
A Tweet of the Mind: Automated Emotion Detection for Social Media Using Brainwave Pattern Analysis |
Abdulaziz Almehmadi
,
Michael Bourque
,
Khalil El-khatib
|
N/A |
|
An Integrative Approach for Measuring Privacy Impact of Identifiers in the Automotive Domain |
Michael Weber
,
Naim Asaj
,
Albert Held
|
N/A |
|
TrustEd - A Dual-Database Trusted Broker for Multi-Agency Data |
Neal Gibson
,
Greg Holland
|
N/A |
|
GSM OTA SIM Cloning Attack and Cloning Resistance in EAP-SIM and USIM |
Ron Ruhl
,
Dale Lindskog
,
Jaspreet Singh
|
N/A |
|
A K-Anonymity Method based on SEM (Search Engine Marketing)Price of Personal Information |
Hidenobu Oguri
,
Noboru Sonehara
|
N/A |
|
Developing IHE-Based PHR Cloud Systems |
Cheng-yi Yang
,
Chien-tsai Liu
|
N/A |
|
Big Data and Policy design for Data Sovereignty: A Case Study on Copyright and CCL in South Korea |
Hyejung Moon
,
Hyun Suk Cho
|
N/A |
|
A Predicting Model of TV Audience Rating Based on the Facebook |
Chen-ming Wu
,
Yu-hsuan Cheng
,
Tsun Ku
,
And Gwo-dong Chen
|
N/A |
|
Robust, Scalable Anomaly Detection for Large Collections of Images |
Michael S Kim
|
N/A |
|
Economics Optimizing Nonlinear Model Predictive Control |
Elrashid Idris
,
Sebastian Engell
|
N/A |
|
HIVE Platform Solutions to Next-Generation Sequencing/Big Data Management Issues |
Raja Mazumder
,
Vahan Simonyan
|
N/A |
|
Intelligent Research Performance Appraisal Model based on Internal/Environmental Evaluation Features |
Donald J. Kim
,
Myunggwon Hwang
,
Jangwon Gim
,
Sa-kwnag Song
,
Do-heon Jeong
,
Seungwoo Lee
,
Hanmin Jung
|
N/A |
|
Next Big Thing in Big Data: the Security of the ICT Supply Chain |
Bing Xu
,
Tianbo Lu
,
Lingling Zhao
,
Xiaobo Guo
,
Yong Peng
,
Hongyu Yang
|
N/A |
|
Real-Time Data Streaming Architecture and Intelligent Workflow Management for Processing Massive Ecological Videos |
Gaya Nadarajan
,
Cheng-lin Yang
,
Yu-jung Cheng
,
Sun-in Lin
,
Yun-heh Chen-burger
,
Fang-pang Lin
|
N/A |
|
Creating Semantic Data from Relational Database |
Chang-hoo Jeong
,
Seungwoo Lee
,
Hanmin Jung
,
Sung-pil Choi
,
Sung-ho Shin
,
Soon-young Kim
,
Pyung Kim
|
N/A |
|
Predicting Links in Human Contact Networks using Online Social Proximity |
Annalisa Socievole
,
Floriano Marano
|
N/A |
|
Identification of User Demographic Traits through Virtual World Language Use |
Aaron Lawson
,
John F. Murray
|
N/A |
|
The Use of Social Science Methods to Predict Player Characteristics from Avatar Observations |
Carl Symborski
,
Meg Barton
,
Geoffrey Cranmer
,
Byron Raines
|
N/A |
|
Analyzing Effects of Public Communication onto Player Behavior in Massively Multiplayer Online Games |
Kiran Lakkaraju
,
Jeremy Bernstein
,
Jonathan Whetzel
|
N/A |
|
M or F IRL?: Predicting MMO Player Gender from In-Game Attributes using Machine Learning Models |
Jaideep Srivastava
,
Tracy Kennedy
,
Rabindra Ratan
,
Komal Kapoor
,
Nishith Pathak
,
Dmitri Williams
|
N/A |
|