The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focuses on the analysis of socio-spatial data, i. e., user-performance relations at a distributed event. We consider the data as a bimodal network (i. e., model it as a bipartite graph), and investigate its structural characteristics towards a social network. We focus on plans of the participants (expressed by preferences) and their fulfilment, and propose measures for matching preference...
A major part of the job offers and candidates profiles are now available online. Leveraging this public data, Multiposting, a subsidiary of SAP, aims at providing in real-time an exhaustive job market analysis through the SmartSearch project. One big issue in this project, and more generally in the e-recruitment and the human resources management, is to extract the skills from the raw texts in order...
The communication and migration patterns of a country are shaped by its socioeconomic processes. The economy of Senegal is predominantly rural, as agriculture employs over 70% of the labor force. In this work, we have used mobile phone records to explore the impact of agricultural activity on the mobility patterns of the inhabitants of Senegal. We have detected an increase in the migration flows throughout...
We use mobile phone records for the analysis of mobility patterns and the detection of possible risk zones of Chagas disease in two Latin American countries. We show that geolocalized call records are rich in social and individual information, which can be used to infer whether an individual has lived in an endemic area. We present two case studies, in Argentina and in Mexico, using data provided...
In this paper we analyse the core-periphery clustering properties of collaboration networks, where the core of a network is formed by the nodes with highest degree. In particular, we first observe that, even for random graph models aiming at matching the degree-distribution and/or the clustering coefficient of real networks, these models produce synthetic graphs which have a spatial distribution of...
In this paper we tackle the recently proposed problem of hidden streams. In many situations, the data stream that we are interested in, is not directly accessible. Instead, part of the data can be accessed only through applying filters (e.g. keyword filtering). In fact this is the case of the most discussed social stream today, Twitter. The problem in this case is how to retrieve as many relevant...
In this paper we study the temporal evolution of review ratings. We observe that on average ratings tend to become more polarized over time. To explain this phenomenon we propose a simple model that captures the tendency of users for rating manipulation. Simulations with our model demonstrate that it is successful in capturing the aggregate behavior of the users.
The increasing use of smartphones to access social media platforms opens a new wave of applications that explore sentiment analysis in the mobile environment. However, there are various existing sentiment analysis methods and it is unclear which of them are deployable in the mobile environment. This paper provides the first of a kind study in which we compare the performance of 17 sentence-level sentiment...
Mental illnesses rank as some of the most disabling conditions, affecting millions of people, across the globe. In general, the main challenge of mental disorders is that they remain difficult to detect on suffering patients. In an online environment, the challenge extends to the collection of patients data and the implementation of proper algorithms to assist in the detection of such illnesses. In...
Lately, Twitter has grown to be one of the most favored ways of disseminating information to people around the globe. However, the main challenge faced by the users is how to assess the credibility of information posted through this social network in real time. In this paper, we present a real-time content credibility assessment system named CredFinder, which is capable of measuring the trustworthiness...
Recent work suggests that providing unexpected information is an important factor for drawing user traffic. Such examples can be easily found in the “Did you know” section of the Wikipedia main page, the ESPN quiz, the Google Doodles, and the Bing main page. Inspired by these applications, we propose a novel trivia quiz mining asking unexpected questions for a given entity. We solve this problem by...
The risks due to a global and unaware diffusion of our personal data cannot be overlooked when more than two billion people are estimated to be registered in at least one of the most popular online social networks. As a consequence, privacy has become a primary concern among social network analysts and Web/data scientists. Some studies propose to “measure” users' profile privacy according to their...
The advancements in wearable technology, where embedded accelerometers, gyroscopes and other sensors enable the users to actively monitor their activity have made it easier for individuals to pursue a healthy lifestyle. However, most of the existing applications expect continuous commitment from the end users, who need to proactively interact with the application in order to connect with friends and...
User profiling from user generated content (UGC) is a common practice that supports the business models of many social media companies. Existing systems require that the UGC is fully exposed to the module that constructs the user profiles. In this paper we show that it is possible to build user profiles without ever accessing the user's original data, and without exposing the trained machine learning...
Social media is an important data source. Every day, billions of posts, likes, and connections are created by people around the globe. By monitoring it we can observe important topics, as well as find new topics of discussion as they emerge. However, within this source of information there are natural forms of bias. Different aspects of the sites lend themselves to bias, such as varying features that...
Social media is often useful for discovering contextual information that is difficult to find on traditional query-based search engines such as Google. For example, temporal events such as traffic incidents are often posted on social media due to the wide-reaching and real-time nature of social media platforms. Social media can also be used to model the sentiments and opinions of different geographical...
Several indices for estimating the influence of social media users have been proposed. Most such indices are obtained from the topological structure of a social network that represents relations among social media users. However, several errors are typically contained in such social network structures because of missing data, false data, or poor node/link sampling from the social network. In this...
Nowadays, communication between people is mediated by technology and more specifically via Internet either by using email or social networking sites. Since any online activity generates an electronic trace, creating an automated tool to collect and analyze the communication between people can be valuable for extracting useful information about their behavioral characteristics. Combining these characteristics,...
Surveillance systems are very important for law enforcement and military applications. Capturing a biometric modality at a distance and under difficult conditions is a very challenging process. While face or gait can be used to identify an individual in such application, tattoos can also help in the identification process whenever available. Tattoos are considered a soft biometric and in some scenarios...
High performance computing systems are becoming the norm for daily use and their applications are being known within academia, industry, and government sectors. However, the resilience of these systems is in question for their complex internal structure makes them difficult to trouble shoot — making them vulnerable to intentional failures. Our work addresses this topic by employing dynamic prediction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.