Social Computing, Behavioral-Cultural Modeling and Prediction
暂无分享,去创建一个
William G. Kennedy | Ariel M. Greenberg | Nathan D. Bos | Nathan D. Bos | W. Kennedy | Ariel M. Greenberg | William G. Kennedy | Nathan D. Bos
[1] Katarzyna Wac,et al. Getting closer: an empirical investigation of the proximity of user to their smart phones , 2011, UbiComp '11.
[2] Kristina Lerman,et al. Modeling Social Annotation: A Bayesian Approach , 2008, TKDD.
[3] William Rand,et al. Differential Adaptive Diffusion: Understanding Diversity and Learning Whom to Trust in Viral Marketing , 2011, ICWSM.
[4] Balachander Krishnamurthy,et al. On the leakage of personally identifiable information via online social networks , 2010, Comput. Commun. Rev..
[5] Alex Pentland,et al. Stealing Reality: When Criminals Become Data Scientists (or Vice Versa) , 2011, IEEE Intelligent Systems.
[6] John Riedl,et al. Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.
[7] Michael I. Jordan,et al. Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..
[8] Eric Gilbert,et al. Predicting tie strength with social media , 2009, CHI.
[9] Alex Pentland,et al. Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data , 2011, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.
[10] Thomas L. Griffiths,et al. The Author-Topic Model for Authors and Documents , 2004, UAI.
[11] Ee-Peng Lim,et al. Generative Models for Item Adoptions Using Social Correlation , 2013, IEEE Transactions on Knowledge and Data Engineering.
[12] D. Kahneman,et al. Attention and Effort , 1973 .
[13] Kristina Lerman,et al. Information Contagion: An Empirical Study of the Spread of News on Digg and Twitter Social Networks , 2010, ICWSM.
[14] M. McPherson,et al. Birds of a Feather: Homophily in Social Networks , 2001 .
[15] Daniel J. Brass,et al. Network Analysis in the Social Sciences , 2009, Science.
[16] Kristina Lerman,et al. How Visibility and Divided Attention Constrain Social Contagion , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.
[17] Clayton Fink,et al. From push brooms to prayer books: Social media and social networks during the London riots , 2013 .
[18] Ronald A. Rensink,et al. TO SEE OR NOT TO SEE: The Need for Attention to Perceive Changes in Scenes , 1997 .
[19] A. Vespignani,et al. Competition among memes in a world with limited attention , 2012, Scientific Reports.
[20] M. Kalmijn,et al. Intermarriage and homogamy: causes, patterns, trends. , 1998, Annual review of sociology.
[21] Chong Wang,et al. Collaborative topic modeling for recommending scientific articles , 2011, KDD.
[22] Scott Counts,et al. Taking It All In? Visual Attention in Microblog Consumption , 2021, ICWSM.
[23] Alex Pentland,et al. How Many Makes a Crowd? On the Evolution of Learning as a Factor of Community Coverage , 2012, SBP.
[24] Mark S. Granovetter. The Strength of Weak Ties , 1973, American Journal of Sociology.
[25] Ramesh Nallapati,et al. Link-PLSA-LDA: A New Unsupervised Model for Topics and Influence of Blogs , 2021, ICWSM.
[26] Alex Pentland,et al. Composite Social Network for Predicting Mobile Apps Installation , 2011, AAAI.
[27] James E. Rauch,et al. Bandwidth and Echo: Trust, Information, and Gossip in Social Networks , 2001 .
[28] Peter Schoo,et al. Infiltrating Critical Infrastructures with Next-Generation Attacks W32.Stuxnet as a Showcase Threat , 2010 .