Sciweavers

Share
WWW
2009
ACM
7 years 1 months ago
The slashdot zoo: mining a social network with negative edges
We analyse the corpus of user relationships of the Slashdot technology news site. The data was collected from the Slashdot Zoo feature where users of the website can tag other user...
J. Kunegis, A. Lomatzsch, and C. Bauckhage

0
posts
with
0
views
116profile views
kennbyrneStudent, Msc
DIT
kennbyrne
ICASSP
2011
IEEE
7 years 9 months ago
Automatic identification of speaker role and agreement/disagreement in broadcast conversation
We present supervised approaches for detecting speaker roles and agreement/disagreement between speakers in broadcast conversation shows in three languages: English, Arabic, and M...
Wen Wang, Sibel Yaman, Kristin Precoda, Colleen Ri...
IOR
2011
175views more  IOR 2011»
8 years 6 days ago
Clique Relaxations in Social Network Analysis: The Maximum k-Plex Problem
This paper introduces and studies the maximum k-plex problem, which arises in social network analysis and has wider applicability in several important areas employing graph-based ...
Balabhaskar Balasundaram, Sergiy Butenko, Illya V....
IDA
2009
Springer
8 years 3 months ago
Mining the Temporal Dimension of the Information Propagation
In the last decade, Social Network Analysis has been a field in which the effort devoted from several researchers in the Data Mining area has increased very fast. Among the possibl...
Michele Berlingerio, Michele Coscia, Fosca Giannot...
JOI
2010
130views more  JOI 2010»
8 years 3 months ago
Diffusion of latent semantic analysis as a research tool: A social network analysis approach
Latent Semantic Analysis (LSA) is a relatively new research tool with a wide range of applications in different fields ranging from discourse analysis to cognitive science, from i...
Yasar Tonta, Hamid R. Darvish
ISI
2008
Springer
8 years 3 months ago
Integrating Data Sources and Network Analysis Tools to Support the Fight Against Organized Crime
We discuss how methods from social network analysis could be combined with methodologies from database mediator technology and information fusion in order to give police and other ...
Luigi Ferrara, Christian Mårtenson, Pontus S...
JSW
2007
106views more  JSW 2007»
8 years 5 months ago
Destabilization of Terrorist Networks through Argument Driven Hypothesis Model
— Social network analysis has been used for quite some time to analyze and understand the behavior of nodes in the network. Theses nodes could be individuals or group of persons,...
Dil Muhammad Akbar Hussain
JAIR
2007
151views more  JAIR 2007»
8 years 5 months ago
Topic and Role Discovery in Social Networks with Experiments on Enron and Academic Email
Previous work in social network analysis (SNA) has modeled the existence of links from one entity to another, but not the attributes such as language content or topics on those li...
Andrew McCallum, Xuerui Wang, Andrés Corrad...
IJWBC
2007
137views more  IJWBC 2007»
8 years 5 months ago
Identifying communities in blogs: roles for social network analysis and survey instruments
: We examine the problem of identifying, measuring and evaluating communities in blogs. In our approach, we use sense of community (McMillan and Chavis, 1986) and centrality measur...
Alvin Chin, Mark H. Chignell
books