Introduction to Social Networks: Analysis and Case Studies
暂无分享,去创建一个
A. Sima Etaner-Uyar | Nagehan Ilhan | Sule Gündüz Ögüdücü | Ş. Öğüdücü | N. Ilhan | A. Etaner-Uyar | Şule Gündüz-Öğüdücü | A. Etaner-Uyar
[1] László Lovász,et al. Random Walks on Graphs: A Survey , 1993 .
[2] Jennifer Neville,et al. Iterative Classification in Relational Data , 2000 .
[3] Walter Willinger,et al. Respondent-Driven Sampling for Characterizing Unstructured Overlays , 2009, IEEE INFOCOM 2009.
[4] Phillip Bonacich,et al. Eigenvector-like measures of centrality for asymmetric relations , 2001, Soc. Networks.
[5] Ee-Peng Lim,et al. Structural Analysis in Multi-Relational Social Networks , 2012, SDM.
[6] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[7] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[8] G. Motta,et al. Cloud Computing: An Architectural and Technological Overview , 2012, 2012 International Joint Conference on Service Sciences.
[9] Matthieu Latapy,et al. Computing Communities in Large Networks Using Random Walks , 2004, J. Graph Algorithms Appl..
[10] Lawrence J. Sanna,et al. Group Research Trends in Social and Organizational Psychology: Whatever Happened to Intragroup Research? , 1997 .
[11] Santo Fortunato,et al. Community detection in graphs , 2009, ArXiv.
[12] H. Jennings,et al. Who Shall Survive , 2007 .
[13] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[14] M E J Newman,et al. Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.
[15] Aric Hagberg,et al. Exploring Network Structure, Dynamics, and Function using NetworkX , 2008, Proceedings of the Python in Science Conference.
[16] Mathieu Bastian,et al. Gephi: An Open Source Software for Exploring and Manipulating Networks , 2009, ICWSM.
[17] C. Mills,et al. The Social Life of a Modern Community. , 1942 .
[18] Sharon L. Milgram,et al. The Small World Problem , 1967 .
[19] S. Kozlowski,et al. Work Groups and Teams in Organizations , 2003 .
[20] E. Mayo,et al. The Social Problems of an Industrial Civilization. , 1946 .
[21] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[22] Gábor Csárdi,et al. The igraph software package for complex network research , 2006 .
[23] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[24] J. Nieminen. On the centrality in a graph. , 1974, Scandinavian journal of psychology.
[25] Philip S. Yu,et al. An Introduction to Privacy-Preserving Data Mining , 2008, Privacy-Preserving Data Mining.
[26] Philip W. L. Fong,et al. Relationship-based access control policies and their policy languages , 2011, SACMAT '11.
[27] D. Harrison,et al. TIES, LEADERS, AND TIME IN TEAMS: STRONG INFERENCE ABOUT NETWORK STRUCTURE'S EFFECTS ON TEAM VIABILITY AND PERFORMANCE , 2006 .
[28] Daniel R. Ilgen,et al. Enhancing the Effectiveness of Work Groups and Teams , 2006, Psychological science in the public interest : a journal of the American Psychological Society.
[29] D. R. White,et al. Structural cohesion and embeddedness: A hierarchical concept of social groups , 2003 .
[30] N. Metropolis,et al. Equation of State Calculations by Fast Computing Machines , 1953, Resonance.
[31] J E Ruth,et al. Classification of art into style periods; a factor-analytical approach. , 1974, Scandinavian journal of psychology.
[32] John Scott. Social Network Analysis , 1988 .
[33] Ezra W. Zuckerman,et al. Networks, Diversity, and Productivity: The Social Capital of Corporate R&D Teams , 2001 .
[34] Mohamed Shehab,et al. Policy-by-example for online social networks , 2012, SACMAT '12.
[35] J. A. Barnes. Class and Committees in a Norwegian Island Parish , 1954 .
[36] A. Barabasi,et al. Quantifying social group evolution , 2007, Nature.
[37] Jiawei Han,et al. Community Mining from Multi-relational Networks , 2005, PKDD.
[38] A. Pfitzmann,et al. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .
[39] Shyhtsun Felix Wu,et al. Crawling Online Social Graphs , 2010, 2010 12th International Asia-Pacific Web Conference.
[40] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994 .
[41] Yan Bai,et al. Design and Implementation of a Secure Healthcare Social Cloud System , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).
[42] Réka Albert,et al. Near linear time algorithm to detect community structures in large-scale networks. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.
[43] Mark S. Granovetter. The Strength of Weak Ties , 1973, American Journal of Sociology.
[44] M. D. Dunnette. Handbook of Industrial and Organizational Psychology , 2005 .
[45] Matthew J. Salganik,et al. 5. Sampling and Estimation in Hidden Populations Using Respondent-Driven Sampling , 2004 .
[46] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[47] Sylvia Richardson,et al. Markov Chain Monte Carlo in Practice , 1997 .
[48] M. Swan. Emerging Patient-Driven Health Care Models: An Examination of Health Social Networks, Consumer Personalized Medicine and Quantified Self-Tracking , 2009, International journal of environmental research and public health.