Familiar Strangers detection in online social networks
暂无分享,去创建一个
[1] Christophe Diot,et al. Are you moved by your social network application? , 2008, WOSN '08.
[2] Jiawei Han,et al. Geo-Friends Recommendation in GPS-based Cyber-physical Social Network , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.
[3] Lee Humphreys,et al. Mobile Social Networks and Social Practice: A Case Study of Dodgeball , 2007, J. Comput. Mediat. Commun..
[4] Eric Paulos,et al. The familiar stranger: anxiety, comfort, and play in public places , 2004, CHI.
[5] Jon Crowcroft,et al. Human mobility models and opportunistic communications system design , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[6] Thrasyvoulos Spyropoulos,et al. Stumbl: Using Facebook to collect rich datasets for opportunistic networking research , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[7] Huan Liu,et al. A Social Identity Approach to Identify Familiar Strangers in a Social Network , 2009, ICWSM.
[8] Hsin-Hsi Chen,et al. Detection of Bloggers' Interests: Using Textual, Temporal, and Interactive Features , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06).
[9] Michael S. Bernstein,et al. Short and tweet: experiments on recommending content from information streams , 2010, CHI.
[10] Vassilis Kostakos,et al. Cityware: Urban Computing to Bridge Online and Real-World Social Networks , 2008 .
[11] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[12] Cynthia Putnam,et al. Getting Online but Still Living Offline: The Complex Relationship of Technology Adoption and In-person Social Networks , 2009, 2009 International Conference on Advances in Social Network Analysis and Mining.
[13] Jiawei Han,et al. A Unified Framework for Link Recommendation Using Random Walks , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.
[14] Matthew Michelson,et al. Tweet Disambiguate Entities Retrieve Folksonomy SubTree Step 1 : Discover Categories Generate Topic Profile from SubTrees Step 2 : Discover Profile Topic Profile : “ English Football ” “ World Cup ” , 2010 .
[15] Sofus A. Macskassy. Contextual linking behavior of bloggers: leveraging text mining to enable topic-based analysis , 2011, Social Network Analysis and Mining.
[16] Daniele Quercia,et al. FriendSensing: recommending friends using mobile phones , 2009, RecSys '09.
[17] Christos Faloutsos,et al. Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining , 2013, ASONAM 2013.
[18] Michael Steurer,et al. Automatically Detecting Points of Interest and Social Networks from Tracking Positions of Avatars in a Virtual World , 2009, 2009 International Conference on Advances in Social Network Analysis and Mining.
[19] Kamal Kant Bharadwaj,et al. A collaborative filtering framework for friends recommendation in social networks based on interaction intensity and adaptive user similarity , 2012, Social Network Analysis and Mining.
[20] David Lazer,et al. Inferring friendship network structure by using mobile phone data , 2009, Proceedings of the National Academy of Sciences.
[21] Peter Lunt,et al. The Individual in a Social World , 2009 .
[22] Sung-Hyuk Cha. Comprehensive Survey on Distance/Similarity Measures between Probability Density Functions , 2007 .
[23] Guanling Chen,et al. Multi-layered friendship modeling for location-based Mobile Social Networks , 2009, 2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous.
[24] Shyhtsun Felix Wu,et al. Analysis of user keyword similarity in online social networks , 2011, Social Network Analysis and Mining.
[25] Padhraic Smyth,et al. Algorithms for estimating relative importance in networks , 2003, KDD '03.
[26] Alex Hai Wang,et al. Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).