You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book addresses the challenges of social network and social media analysis in terms of prediction and inference. The chapters collected here tackle these issues by proposing new analysis methods and by examining mining methods for the vast amount of social content produced. Social Networks (SNs) have become an integral part of our lives; they are used for leisure, business, government, medical, educational purposes and have attracted billions of users. The challenges that stem from this wide adoption of SNs are vast. These include generating realistic social network topologies, awareness of user activities, topic and trend generation, estimation of user attributes from their social content, and behavior detection. This text has applications to widely used platforms such as Twitter and Facebook and appeals to students, researchers, and professionals in the field.
This edited volume addresses the vast challenges of adapting Online Social Media (OSM) to developing research methods and applications. The topics cover generating realistic social network topologies, awareness of user activities, topic and trend generation, estimation of user attributes from their social content, behavior detection, mining social content for common trends, identifying and ranking social content sources, building friend-comprehension tools, and many others. Each of the ten chapters tackle one or more of these issues by proposing new analysis methods or new visualization techniques, or both, for famous OSM applications such as Twitter and Facebook. This collection of contributed chapters address these challenges. Online Social Media has become part of the daily lives of hundreds of millions of users generating an immense amount of 'social content'. Addressing the challenges that stem from this wide adaptation of OSM is what makes this book a valuable contribution to the field of social networks.
This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.
This book focusses on recommendation, behavior, and anomaly, among of social media analysis. First, recommendation is vital for a variety of applications to narrow down the search space and to better guide people towards educated and personalized alternatives. In this context, the book covers supporting students, food venue, friend and paper recommendation to demonstrate the power of social media data analysis. Secondly, this book treats behavior analysis and understanding as important for a variety of applications, including inspiring behavior from discussion platforms, determining user choices, detecting following patterns, crowd behavior modeling for emergency evacuation, tracking community structure, etc. Third, fraud and anomaly detection have been well tackled based on social media analysis. This has is illustrated in this book by identifying anomalous nodes in a network, chasing undetected fraud processes, discovering hidden knowledge, detecting clickbait, etc. With this wide coverage, the book forms a good source for practitioners and researchers, including instructors and students.
These proceedings contain the papers presented at the 2005 IFIP International Conference on Network and Parallel Computing (NPC 2005), held in Beijing, China, between November 30 and December 3, 2005. The goal of the conference was to establish an international forum for engineers and scientists to present their ideas and experiences in network and parallel computing. A total of 320 submissions were received in response to our Call for Papers. These papers were from the following countries or regions: Australia, Canada, China, France, Germany, Hong Kong, India, Iran, Italy, Japan, Korea, Lux- burg, Nepal, Netherlands, Taiwan, United Arab Emirates, and United States. Each submission was sent ...
Rapid technological advancement has given rise to new ethical dilemmas and security threats, while the development of appropriate ethical codes and security measures fail to keep pace, which makes the education of computer users and professionals crucial. The Encyclopedia of Information Ethics and Security is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. Covering a wide range of themes, this valuable reference tool includes topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. This encyclopedia is a useful tool for students, academics, and professionals.
This book presents a selective collection of papers from the 20th International Symposium on Computer and Information Sciences, held in Istanbul, Turkey. The selected papers span a wide spectrum of topics in computer networks, including internet and multimedia, security and cryptography, wireless networks, parallel and distributed computing, and performance evaluation. These papers represent the results of the latest research of academicians from more than 30 countries.
This book constitutes the refereed proceedings of the 8th International Conference on Distributed Computing and Networking, ICDCN 2006, held in Guwahati, India in December 2006. Coverage in this volume includes ad hoc networks, distributed computing and algorithms, security, grid and P2P computing, performance evaluation, internetworking protocols and applications, optical networks and multimedia, sensor networks, and wireless networks.
DISC, the International Symposium on DIStributed Computing, is an annual forum for research presentations on all facets of distributed computing. DISC 2000 was held on4-6 October, 2000 in Toledo, Spain. This volume includes 23 contributed papers and the extended abstract of an invited lecture from last year’s DISC. It is expected that the regular papers will later be submitted in a more polished form to fully refereed scienti?c journals. The extended abstracts of this year’s invited lectures, by Jean-Claude Bermond and Sam Toueg, will appear in next year’s proceedings. We received over 100 regular submissions, a record for DISC. These s- missions were read and evaluated by the program committee, with the help of external reviewers when needed. Overall, the quality of the submissions was excellent, and we were unable to accept many deserving papers. This year’s Best Student Paper award goes to “Polynomial and Adaptive Long-Lived (2k?1)-Renaming” by Hagit Attiya and Arie Fouren. Arie Fouren is the student author.
"This multiple-volume publication advances the emergent field of mobile computing offering research on approaches, observations and models pertaining to mobile devices and wireless communications from over 400 leading researchers"--Provided by publisher.