The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile social networks have gained tremendous popularity among hundreds of millions of Internet users due to their fast information spreading and strong inter-person influence. However, the high complexity of social interactions and the intrinsic dynamics of mobile social networks make it challenging to model the spreading mechanism delicately and enable precise prediction of information diffusion...
WeChat is a mobile messaging application that has 549 million active users as of Q1 2015, and “WeChat Moments” (WM) serves its social-networking function that allows users to post/share links of web pages. WM differs from the other social networks as it imposes many restrictions on the information diffusion process to mitigate the information overload. In this paper, we conduct a measurement study...
With the rapid growth of Internet technologies, cloud computing and social networks have become ubiquitous. An increasing number of people participate in social networks and massive online social data are obtained. In order to exploit knowledge from copious amounts of data obtained and predict social behavior of users, we urge to realize data mining in social networks. Almost all online websites use...
Nowadays, many organizations or corporations, such as banks, hospitals, schools, etc., use third-party platform to send notifications or information to their customers or users. This communication model can be generalized to the publish/subscribe model. The publisher will send the content to the subscriber whenever there is any new content that matches the interest of the subscriber. However, the...
Information cascade characterizes the situation where rational agents are overloaded with social observations and can make decisions ignoring their own personal evidence. If the social observations are misleading, the overall system performance can be subsequently compromised. Therefore, it is of interests to design a socially or interactively networked system falling into undesirable or desirable...
Friend discovery has been one of the hot topics in our social activities over the past decade. Mobile users have more opportunities to discover and make new social interactions with others in vicinity to build and extend their social communities. However, the inevitable information releasing conflicts with the increasing privacy concerns. In this paper, we employ the concept of friend-of-friend and...
Nowadays, the notion of diseases has been extended from real human diseases to general epidemic information propagations, such as the rumors in distributed systems. Controlling the spread of a disease is usually done through quarantine, where people that have, or are suspected to have, a disease are isolated from having interactions with others. As a tradeoff, normal human interactions are inevitably...
In our recent works, we developed a probabilistic framework for structural analysis in undirected networks. The key idea of that framework is to sample a network by a symmetric bivariate distribution and then use that bivariate distribution to formerly define various notions, including centrality, relative centrality, community, and modularity. The main objective of this paper is to extend the probabilistic...
The seminal works by Karger [13], [14] have shown that one can use Uniform Random Edge (URE) sampling to generate a graph skeleton which accurately approximates all cut-values in the original graph with high probability under some specific assumptions. As such, the random subgraphs resulted from URE sampling can often be used as substitutes for the original graphs in cut/flow-related graph-optimization...
Crowdsourcing is often used to solicit contributions from an online community for ideas, evaluation and opinions. However, spamming can pollute such a system and manipulate the results of crowdsourcing. For detection of those spammers, the training data used in previous studies is often derived by experts labeling collected data and manually identifying spammers. The reliability of such training data...
In social networks, most information is stored, displayed and propagated in the form of text which is characterized by latent topics. With the discovery of latent topics, we can make more accurate prediction, inference and therefore, better applications, in social networks. Considering the dynamics and noise in social networks, we analyze data evolution from different perspectives including both common...
Online social search such as Quora and Zhihu brings new ways to obtain answers to questions in social networks. However, personal and other sensitive information may be exposed to others when the question spreads via the social network. People obtain utility when they obtain answers to their questions but may suffer privacy cost when their personal information is known by others. Researchers are seeking...
To facilitate content distribution and diffusion, efficacious caching strategy plays an important role in content dissemination control, especially in dynamic mobile social networks (MSNs), where contents spreading and accessing rely mainly on opportunistic contacts in physical proximity. Since content dissemination much resembles epidemic dynamics, two caching control schemes, caching at external...
Deriving trust relationships from real-world social interactions may contribute significant information towards social behaviour understanding. The level of trust among people constitutes an insightful parameter for describing the social context but also an important measure for security and privacy in pervasive systems. Current works for deriving trust relationships either consider only on-line social...
Two of the most popular applications of smartphones are online social networking and playing back music. In this paper, we present the design and implementation of a prototype that combines those usages by creating an architecture that allows the generation and playback of group music playlists that are based on the musical taste of individual guests attending a meeting. In our architecture, we utilize...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.