The power of indirect ties
暂无分享,去创建一个
Adriana Iamnitchi | John Skvoretz | Xiang Zuo | Jeremy Blackburn | Nicolas Kourtellis | J. Skvoretz | J. Blackburn | N. Kourtellis | Xiang Zuo | Adriana Iamnitchi | Jeremy Blackburn
[1] Robert Cole,et al. Computer Communications , 1982, Springer New York.
[2] I. N. A. C. I. J. H. Fowler. Book Review: Connected: The surprising power of our social networks and how they shape our lives. , 2009 .
[3] Esteban Moro,et al. Social Features of Online Networks: The Strength of Intermediary Ties in Online Social Media , 2011, PloS one.
[4] R. Burt. Social Contagion and Innovation: Cohesion versus Structural Equivalence , 1987, American Journal of Sociology.
[5] D. Watts,et al. Origins of Homophily in an Evolving Social Network1 , 2009, American Journal of Sociology.
[6] Adam M. Kleinbaum. Organizational Misfits and the Origins of Brokerage in Intra-Firm Networks , 2012 .
[7] Jinyang Li,et al. F2F: Reliable Storage in Open Networks , 2006, IPTPS.
[8] A. Rapoport. Spread of information through a population with socio-structural bias: I. Assumption of transitivity , 1953 .
[9] Pietro Michiardi,et al. An empirical study of availability in friend-to-friend storage systems , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.
[10] Paul Anderson,et al. On managing social data for enabling socially-aware applications and services , 2010, SNS '10.
[11] George C. Homans. Human Group , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[12] Dan Cosley,et al. Inferring social ties from geographic coincidences , 2010, Proceedings of the National Academy of Sciences.
[13] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[14] Linyuan Lu,et al. Link Prediction in Complex Networks: A Survey , 2010, ArXiv.
[15] Sinan Aral,et al. The Diversity-Bandwidth Trade-off1 , 2011, American Journal of Sociology.
[16] Eric Gilbert,et al. Predicting tie strength with social media , 2009, CHI.
[17] Adriana Iamnitchi,et al. Relationships under the Microscope with Interaction-Backed Social Networks , 2013 .
[18] N. Christakis,et al. Dynamic spread of happiness in a large social network : longitudinal analysis of the Framingham Heart Study social network. Commentary , 2009 .
[19] Mark S. Granovetter. Getting a Job: A Study of Contacts and Careers , 1974 .
[20] Adriana Iamnitchi,et al. The power of indirect ties in friend-to-friend storage systems , 2014, 14-th IEEE International Conference on Peer-to-Peer Computing.
[21] Adriana Iamnitchi,et al. On the Design of Socially-Aware Distributed Systems , 2012 .
[22] Michael McGill,et al. Introduction to Modern Information Retrieval , 1983 .
[23] G. C. Homans,et al. Social Behavior: Its Elementary Forms. , 1975 .
[24] Haiying Shen,et al. SOAP: A Social network Aided Personalized and effective spam filter to clean your e-mail box , 2011, 2011 Proceedings IEEE INFOCOM.
[25] M. De Domenico,et al. The Anatomy of a Scientific Rumor , 2013, Scientific Reports.
[26] Marshall Van Alstyne,et al. The Diversity-Bandwidth Tradeoff , 2010 .
[27] M. McPherson,et al. Birds of a Feather: Homophily in Social Networks , 2001 .
[28] Alexandru Iosup,et al. TRIBLER: a social-based peer-to-peer system: Research Articles , 2008 .
[29] Dino Pedreschi,et al. "How Well Do We Know Each Other?" Detecting Tie Strength in Multidimensional Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[30] Rossano Schifanella,et al. The role of information diffusion in the evolution of social networks , 2013, KDD.
[31] Mark S. Granovetter. The Strength of Weak Ties , 1973, American Journal of Sociology.
[32] Matei Ripeanu,et al. Cheating in Online Games: A Social Network Perspective , 2014, TOIT.
[33] William W. Cohen,et al. Recommendation as Classification: Using Social and Content-Based Information in Recommendation , 1998, AAAI/IAAI.
[35] Daniel J. Brass,et al. Relationships and Unethical Behavior: A Social Network Perspective , 1998 .
[36] Jon M. Kleinberg,et al. The link-prediction problem for social networks , 2007, J. Assoc. Inf. Sci. Technol..
[37] Ben Y. Zhao,et al. User interactions in social networks and their implications , 2009, EuroSys '09.
[38] Jimeng Sun,et al. Social influence analysis in large-scale networks , 2009, KDD.
[39] Wolfgang Kellerer,et al. Outtweeting the Twitterers - Predicting Information Cascades in Microblogs , 2010, WOSN.
[40] Ian Witten,et al. Data Mining , 2000 .
[41] Lada A. Adamic,et al. Friends and neighbors on the Web , 2003, Soc. Networks.
[42] Adriana Iamnitchi,et al. The Influence of Indirect Ties on Social Network Dynamics , 2014, SocInfo.
[43] Noah E. Friedkin,et al. Horizons of Observability and Limits of Informal Control in Organizations , 1983 .
[44] Stan Matwin,et al. Addressing the Curse of Imbalanced Training Sets: One-Sided Selection , 1997, ICML.
[45] N. Christakis,et al. The Spread of Obesity in a Large Social Network Over 32 Years , 2007, The New England journal of medicine.
[46] Nitesh V. Chawla,et al. SMOTE: Synthetic Minority Over-sampling Technique , 2002, J. Artif. Intell. Res..
[47] Andrew S. Tanenbaum,et al. Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System , 2004, Security Protocols Workshop.
[48] Mehmet E. Yildiz,et al. Asymmetric information diffusion via gossiping on static and dynamic networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[49] Ciro Cattuto,et al. What's in a crowd? Analysis of face-to-face behavioral networks , 2010, Journal of theoretical biology.
[50] B. Wellman. Structural analysis: From method and metaphor to theory and substance. , 1988 .
[51] Leo Katz,et al. A new status index derived from sociometric analysis , 1953 .
[52] D. M. Chiu,et al. Erasure code replication revisited , 2004, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings..
[53] Jun Wang,et al. TRIBLER: a social‐based peer‐to‐peer system , 2008, IPTPS.
[54] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[55] Lada A. Adamic,et al. The role of social networks in information diffusion , 2012, WWW.
[56] Daniel Z. Levin,et al. The Strength of Weak Ties You Can Trust: The Mediating Role of Trust in Effective Knowledge Transfer , 2004, Manag. Sci..
[57] Jennifer Neville,et al. Using Transactional Information to Predict Link Strength in Online Social Networks , 2009, ICWSM.
[58] Hakim Hacid,et al. A predictive model for the temporal dynamics of information diffusion in online social networks , 2012, WWW.
[59] Cécile Favre,et al. Information diffusion in online social networks: a survey , 2013, SGMD.
[60] Jennifer Neville,et al. Modeling relationship strength in online social networks , 2010, WWW '10.
[61] Raúl Gracia Tinedo,et al. Analysis of data availability in F2F storage systems: When correlations matter , 2012, P2P.