The Social Hourglass: An Infrastructure for Socially Aware Applications and Services

As the Internet's hourglass architecture connects various resources to various applications, an infrastructure that collects information from various social signals can support an ever-evolving set of socially aware applications and services. Among the proposed infrastructure's features are social sensors to capture and interpret social signals from user interactions, a personal social information aggregator, and a set of social-inference functions as its API for social applications.

[1]  Xiang Cao,et al.  Sociable killers: understanding social relationships in an online first-person shooter game , 2011, CSCW '11.

[2]  Matthew Richardson,et al.  Yes, there is a correlation: - from social networks to personal behavior on the web , 2008, WWW.

[3]  A-L Barabási,et al.  Structure and tie strengths in mobile communication networks , 2006, Proceedings of the National Academy of Sciences.

[4]  Alex Pentland,et al.  Capturing Individual and Group Behavior with Wearable Sensors , 2009, AAAI Spring Symposium: Human Behavior Modeling.

[5]  Mirco Musolesi,et al.  Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application , 2008, SenSys '08.

[6]  Abdulmotaleb El-Saddik,et al.  Building Dynamic Social Network From Sensory Data Feed , 2010, IEEE Transactions on Instrumentation and Measurement.

[7]  Michael Szell,et al.  Measuring social dynamics in a massive multiplayer online game , 2009, Soc. Networks.

[8]  David Pollington,et al.  The calendar as a sensor: analysis and improvement using data fusion with social networks and location , 2010, UbiComp.

[9]  Jie Liu,et al.  SpeakerSense: Energy Efficient Unobtrusive Speaker Identification on Mobile Phones , 2011, Pervasive.

[10]  P. Oscar Boykin,et al.  Collaborative Spam Filtering Using E-Mail Networks , 2006, Computer.

[11]  Jennifer Neville,et al.  Modeling relationship strength in online social networks , 2010, WWW '10.

[12]  Sindhura Parvathaneni Collaborative Spam Filtering , 2011 .

[13]  Ben Y. Zhao,et al.  User interactions in social networks and their implications , 2009, EuroSys '09.

[14]  Adriana Iamnitchi,et al.  Vulnerability in socially-informed peer-to-peer systems , 2011, SNS '11.

[15]  Sonja Buchegger,et al.  PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.

[16]  George Varghese,et al.  MobiClique: middleware for mobile social networking , 2009, WOSN '09.

[17]  Joseph M. Hellerstein,et al.  Searching for Jim Gray: a technical overview , 2011, CACM.

[18]  Ralf Steinmetz,et al.  LifeSocial.KOM: A secure and P2P-based solution for online social networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[19]  Valérie Issarny,et al.  Yarta: A Middleware for Managing Mobile Social Ecosystems , 2011, GPC.

[20]  Paul Anderson,et al.  Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications , 2010, Middleware.