As On Am Program
As On Am Program
As On Am Program
2011 International Conference on Advances in Social Networks Analysis and Mining Kaohsiung, Taiwan / July 25-27, 2011
Conference Program
Jointly with The First Workshop on Social Network Analysis in Applications (SNAA 2011) Cyberpsychological Analysis of Social Network Sites and User Behavior (CASNSUB) The 3rd International Workshop on Mining Social Networks for Decision Support (MSNDS 2011) Workshop on Mobile Social Network 2011 (MSN 2011) The 1st International Workshop on Cloud Computing in Social Networks (CCSN 2011)
Conference Sponsors
ASONAM 2011
Academic Sponsors
National University of Kaohsiung, Taiwan National Science Council, Taiwan Ministry of Education, Taiwan Web Intelligence Consortium Taiwan Center State University of New York at Stony Brook, USA University of Southern Denmark, Denmark University of Calgary, Canada Hellenic American University, Greece Global University, Lebanon
SolventoSOFT
Industrial Sponsors
WebGenie
Meet Taiwan
Springer
In cooperation with
Technically supported by
&
ACM Special Interest Group on Computer Human Interaction ACM Special Interest Group on Hypertext, Hypermedia and the Web IEEE Technical Committee on Awareness Computing IEEE Technical Committee on Data Engineering IEEE Technical Committee on Granular Computing
Table of Contents
ASONAM 2011 Conference Sponsors ......................................................................................................... 1 Table of Contents .............................................................................................................. 4 Advisory Committee ..........................................................................................................5 Organizing Committee .................................................................................................... 6 Program Committee ......................................................................................................... 8 External Reviewers ........................................................................................................... 11 A Message from the General Chairs .............................................................................. 12 A Message from the Program Chairs .............................................................................13 Conference Program At a Glance................................................................................... 14 Keynote Speakers ............................................................................................................. 17 Conference Program....................................................................................................... 26 Conference Abstracts ...................................................................................................... 35 Conference Posters .......................................................................................................... 77 Conference Venue ............................................................................................................82 Conference Room Plan .................................................................................................. 84
Advisory Committee
ASONAM 2011
Frank Hsu, Fordham University, USA Been-Chien Chien, National University of Tainan, Taiwan Shie-Jue Lee, National Sun Yat-Sen University, Taiwan Tsau-Young Lin, San Jose State University, USA Wen-Yang Lin, National University of Kaohsiung, Taiwan Ngoc-Thanh Nguyen, Wroclaw University of Technology, Poland Ted Teng, State University of New York at Stony Brook, USA Shusaku Tsumoto, Shimane University, Japan Von-Wun Soo, National Tsing Hua University, Taiwan
Organizing Committee
ASONAM 2011
Ken Barker, University of Calgary Ing-Chung Huang, National University of Kaohsiung Per Michael Johansen, University of Southern Denmark Leonidas-Phoebus Koskos, Hellenic American University Abdul Qadeer Khan Rajput, Mehran University of Engineering and
Technology
General Chairs
Tzung-Pei Hong, National University of Kaohsiung Leon Shyue-Liang Wang, National University of Kaohsiung Uffe Kock Wiil, University of Southern Denmark
Program Chairs
Reda Alhajj, University of Calgary Nasrullah Memon, University of Southern Denmark I-Hsien Ting, National University of Kaohsiung
Publicity Chairs
Malek Haroud, Global University Ying-Feng Kuo, National University of Kaohsiung Tsau-Young Lin, San Jose State University Tansel zyer, TOBB Economics and Technology University Jon Rokne, University of Calgary Chien-Hsing Wu, National University of Kaohsiung
Publications Chairs
Panagiotis Karampelas, Hellenic American University Yu-Hui Tao, National University of Kaohsiung
Web Chair
Program Committee
ASONAM 2011 Ajith Abraham, Norwegian University of Science and Technology, Norway Nitin Agarwal, University of Arkansas at Little Rock, USA Harith Alani, University of Southampton, UK Ira Assent, Aalborg University, Denmark Guido Barbian, Unversity of Lneburg, Germany Kanishka Bhaduri, NASA, USA Marenglen Biba, University of New York Tirana, Albania Francesco Bonchi, Yahoo! Research Barcelona, Spain Dan Braha, New England Complex Systems Institute, USA Bin Cao, The Hong Kong University of Science and Technology, China Andre Carvalho, Universidade de Sao Paulo, Brazil Chien-Chung Chan, University of Akron, USA Nitesh V. Chawla, University of Notre Dame, USA Richard Chbeir, LE2I-CNRS, France Li Chen, Hong Kong Baptist University, HK Yunwei Chen, National Science Library, Chinese Academy of Sciences James Cheng, Nanyang Technological University, Singapore Yun Chi, NEC Laboratories America, USA Been-Chian Chien, National Tainan University, Taiwan Tung-Hsiang Chou, National Kaohsiung First University of Science and Technology Munmun De Choudhury, Arizona State University, Tempe, USA Gao Cong, Aalborg University, Denmark Ioanna Constantiou, Copenhagen Business School, Denmark Diane Cook, Washington State University, USA Xiaohui Cui, Oak Ridge National Laboratory, USA Alfredo Cuzzocrea, University of Calabria, Italy Min-Yuh Day, National Taiwan University, Taiwan Petra Deger, University of Regensburg, Germany Jana Diesner, Carnegie Mellon University, USA Ying Ding, Indiana University, USA Carlotta Domeniconi, George Mason University, USA Artur Dubrawski, Carnegie Mellon University, USA Schahram Dustdar, Technical University Wien, Austria Yuval Elovici, Ben-Gurion University of the Negev, Isreal Behrouz Far, University of Calgary, Canada Michael Farrugia, University College Dublin, Ireland Terrill Frantz, Carnegie Mellon University, USA Matjaz Gams, Jozef Stefan Institute, Slovenia Minos Garofalakis, Technical University of Crete, Greece Paolo Garza, Politecnico di Torino, Italy Amol Ghoting, IBM T. J. Watson Research, USA Uwe Glaesser, Simon Fraser University, Canada Tyrone Grandison, IBM Almaden Research Center, USA William Grosky, University of Michigan, USA Fabrice Guillet, Nantes University, France Jiawei Han, University of Illinois at Urbana-Champaign, USA
Sangki Steve Han, KAIST, Korea Hoang Huu Hanh, HUE University, Vietnam
Choochart Haruechaiyasak, National Electronics and Computer Technology Center, Thailand
Dominique Haughton, Bently University, USA Conor Hayes, Digital Enterprise Research Institute, Ireland Nicola Henze, University of Hannover, Germany David L. Hicks, Aalborg University, Denmark Erick Ho, Oriental Institute of Technology, Taiwan Hui-Huang Hsu, Tamkang University, Taiwan Weidong Tony Huang, CSIRO ICT Center, Australia Yun Huang, Northwestern University, USA Yuan-chu Hwang, National United University, Taiwan Ruoming Jin, Kent State University, USA Jason J. Jung, Yeungnam University, Korea Mehmed Kantardzic, University of Louisville, USA Panagiotis Karampelas, Hellenic American University, Greece Mehmet Kaya, Firat University, Turkey Yiping Ke, The Chinese University of Hong Kong, China Larry Kerschberg, George Mason University, USA Taghi Khoshgoftaar, Florida Atlantic University, USA Keivan Kianmehr, University of Calgary, Canada Chris Kimble, Euromed Management, France Peer Krger, Universitt Mnchen, Germany Adam Krzyzak, Concordia University, Canada Rui Kuang, University of Minnesota, USA Yau-Hwang Kuo, National Cheng-Kung University, Taiwan Christine Largeron, University Jean Monnet, France Kim S. Larsen, University of Southern Denmark, Denmark Hady W. Lauw, Microsoft Research, USA Chung-Hong Lee, National Kaohsiung University of Applied Sciences, Taiwan Hahn-Ming Lee, National Taiwan University of Science and Technology, Taiwan Kwan Hong Lee, MIT, USA Juergen Lerner, University of Konstanz, Germany Gang Li, Deakin University, Australia Jun Li, Nanyang Technological University, Singapore Ming Li, Nanjing University, China Hwee Ling Lim, The Petroleum Institute, United Arab Emirates Wen-Yang Lin, National University of Kaohsiung, Taiwan Xumin Liu, Rochester Institute of Technology, USA Zongmin Ma, Northeastern University, China Massimo Marchiori, UNIPD and UTILABS, Italy Byron Marshall, Oregon State University, USA Yutaka Matsuo, University of Tokyo, Japan Haris Memic, University of Essex, UK Peter Mutschke, GESIS-IZ, Germany Shinsuke Nakajima, Kyoto Sangyo University, Japan Federico Neri, Synthema S.r.l., Italy Darko Obradovic, German Research Center for Artificial Intelligence, Germany Kok-Leong Ong, Deakin University, Australia Tansel zyer, TOBB, Turkey Marcin Paprzycki, IBS PAN and WSM, Poland
Gregory Piatetsky-Shapiro, KDnuggets Marc Plantevit, LIRIS-CNRS, France Laura Pullum, Oak Ridge National Laboratory, USA Huzefa Rangwala, George Mason University, USA Christopher Rhodes, Imperial College, United Kingdom Christopher Rouff, Lockheed Martin Advanced Technology Laboratories, USA Alessandra Sala, University of California Santa Barbara, USA Antonio Sanfilippo, Pacific Northwest National Laboratory, USA Christoph Schmitz, Universitt Kassel, Germany Mohamed Shehab, University of North Carolina at Charlotte, USA Jun Shen, University of Wollongong, Australia Wanita Sherchan, CSIRO, Australia Mohammed Yakoob Siyal, Nanyang Technological University, Singapore Andy Song, RMIT University, Australia Von-Wun Soo, National TsingHua University, Taiwan Jerzy Surma, Warsaw School of Economics, Poland Andrea Tagarelli, University of Calabria, Italy Lei Tang, Yahoo! Lab, USA Jie Tang, Tsinghua University, China Alex Thomo, University of Victoria, Canada Hannu Toivonen, University of Helsinki, Finland Frank S.C. Tseng, National Kaohsiung First University of Science and Technology, Taiwan Lorna Uden, University of Staffordshire, UK Julien Velcin, University Lyon, France Chris Volinsky, AT&T, USA Dorothea Wagner, Karlsruhe Institute of Technology, Germany Christian Waldstrom, Aarhus School of Business, Denmark Jianyong Wang, Tsinghua University, China Kai-Yu Wang, Brock University, Canada Tien-Chin Wang, National Kaohsiung University of Applied Sciences, Taiwan Raymond Chi-Wing Wong, Hong Kong University of Science and Technology, HK Chih-Hung Wu, National University of Kaohsiung, Taiwan Hui-Ju Wu, National Changhua University of Education, Taiwan S. Felix Wu, University of California, Davis, USA Jennifer Xu, Bentley College, USA Pingkun Yan, Philips Research, USA Hsieh-Hua Yang, Oriental Institute of Technology, Taiwan Daniel Zeng, University of Arizona, USA Min-Ling Zhang, Hohai University, China Zhongfei Mark Zhang , SUNY Binghamton, USA Kaidi Zhao, Amazon.com Inc, USA Qiangfu Zhao, University of Aizu, Japan Lina Zhou, University of Maryland Baltimore County, USA Xiangmin Zhou, CSIRO, Australia Haibin Zhu, Nipissing University, Canada Peidong Zhu, National University of Defense Technology, China Xingquan Zhu, CSIRO, Australia
10
External Reviewers
ASONAM 2011
Hijbul Alam Sam Blasiak Shumo Chu Pasquale De Meo Huiji Gao Robert Grke Xia Hu Andrey Kan Shamanth Kumar Ofrit Lesser Yingming Li Lin Liu Pierre-Nicolas Mougel Yu Peng Harald Psaier Kun Qian Zeehasham Rasheed Rouff Tanwistha Saha Anna Stavrianou Jiliang Tang Ze Tian Shiro Uesugi Chao-Lin Wu Zhiqiang Xu Liangliang Ye Yang Yu
Sofia Angeletou Haiquan Chen Kamalika Das Bolin Ding Toader David Gherasim Zhouzhou He Ioana Hulpus Daisuke Kitayama Yi-Horng Lai Alex Leung Shoude Lin Claudia Marinica Kenta Oku Giovanni Ponti Rami Puzis Pir Abdul Rasool Queshi Jia Rong Ning Ruan Marian Scuturici Xiaoyuan Su Mohammad A. Tayebi Martin Treiber Jinlong Wang Yang Xiang Ming Yang Xiao Yu Jianwei Zhang
11
Tzung-Pei Hong, Leon Shyue-Liang Wang, and Uffe K. Wiil General Chairs
12
13
14
15
16
Keynote Speakers
ASONAM 2011
Keynote
09:30-10:30 Chair:
Room: B101
Abstract
The paper will review a flexible framework for the analysis of social network data based on exponential random graph models and will present several recent developments that enhance the capacity of the framework to yield theoretically principled and empirically plausible models for social networks and network-based social processes. In particular, a hierarchy of potential models for social networks is developed and it shown how this hierarchy can be used (a) to estimate models from empirical social network data and evaluate model fit, and (b) extend this capacity to the case of certain types of sampled data.
Short Bio
Professor Philippa (Pip) Pattison is a quantitative psychologist recognised for her work in the development of mathematical models for social and behavioural phenomena, particularly for social networks and network-based social processes. Pip completed both a Bachelor of Science (Hons) and a PhD at the University of Melbourne. Pip served as Head of the School of Behavioural Sciences at the University of Melbourne from 2002-2003, and from 2007-2008 was the President of the Universitys Academic Board. In 2009 she was appointed as the Pro Vice-Chancellor (Learning & Teaching) at the University of Melbourne. In May 2011, Professor Pattison was appointed as Deputy Vice-Chancellor (Academic). As Deputy Vice Chancellor (Academic), Pip is responsible for leading the University's learning and teaching strategy and consolidating the implementation of Melbourne Model programs. She works in collaboration with colleagues across the University to ensure that its academic programs meet the high standards in teaching and learning that have been set for them and, in particular, achieve their distinctive learning outcomes. Pip was elected a Fellow of the Academy of the Social Sciences in Australia in 1995.
17
Keynote
14:00-15:00 Chair:
Room: B101
Abstract
In this talk, I shall introduce several techniques used to mine social networks from Web information. The objective of the research is the mining of large-scale entity-relation networks from the Web to support advanced knowledge integration, structuring, and retrieval. The key feature of the algorithm is its utilization of a search engine public interface with machine-learning and text-processing techniques. This talk presents a summary of our studies reported at several past conferences including WWW, IJCAI, and AAAI. It will cover the technologies underlying the most popular people search application in Japan, called SPYSEE, which has 20 million page-views per month.
Short Bio
Yutaka Matsuo is an Associate Professor at the Institute of Engineering Innovation, The University of Tokyo. He received his BS, MS, and PhD degrees from The University of Tokyo in 1997, 1999, and 2002 (supervised by Prof. Ishizuka). He worked at the National Institute of Advanced Industrial Science and Technology (AIST) during 20022007. His emphases of study are web mining (specifically social network mining), text processing, and semantic web in the context of artificial intelligence research. Prof. Matsuo is a prominent young researcher in the information technology field in Japan. He received the Japanese Society for Artificial Intelligence (JSAI) Best Paper Award in 2002, the JSAI Anniversary Project Award in 2006, and Information Processing Society of Japan (IPSJ) Nagao Special Researcher Award in 2008. He joined the editorial committee of JSAI in 2004, and currently serves as Associate Editor-in-Chief. He received a Japan Society for the Promotion of Science (JSPS) Postdoctoral Fellowship for Research Abroad in 2005 and remained for two years at the Center for the Study of Language and Information (CSLI) at Stanford University. He is a PC member of several conferences and is an editor of journals including the International World Wide Web Conference (WWW), International Conference on Artificial Intelligence (IJCAI), and IEEE Transactions on Knowledge Engineering and Data Mining (TKDE).
18
Keynote
A Changing Nature of Warfare Requires a Change of Mindset of Defense Intelligence and the Role of OSINT and Social Networks therein
Arno H. P. Reuser Chief, Open Source Intelligence, Defence Intelligence and Security Service
09:00-10:00 Chair:
Room: B101
Abstract
There is a radical change underway in which warfare is being conducted. That change is there, it has been there for quit some time and it will most probably continue to grow in importance and significance. It is called Computer Network Operations (CNO), or, information warfare or cyber warfare. Two forms are of particular interest: computer network attack (CNA: attacking, changing and possibly destroying systems of the opposing forces) and computer network exploitation (CNE: cyber espionage, or finding and taking sensitive information from computer networks). For every threat there are in reality two threats, the second one being the vulnerability to attack by its victims, due to lack of awareness, training and education. Social networks play a crucial role in CNO especially for the deployment of cyber weapons such as identity theft and the dissemination of malware to create computer zombie networks. Two traditional intelligence collection disciplines need to change their mindset: SIGINT and OSINT as the logical foundation of CNO. The keynote speech will address these issues and explain the important relationship between social networks
Short Bio
Arno Reuser is a professional librarian / information professional with more than 30 years experience in information handling and processing. He founded the Open Source Intelligence Unit of the Dutch Defence Intelligence & Security Service about 15 years ago and still heads it today. Mr. Reuser holds a bachelor degree in librarianship and has completed many courses in digital information management, Internet search strategies, update workshops etc. He learned the technical requirements of today's digital world by learning how to write software, program scripts to automate tasks, building websites, getting the most out of the Internet by studying network theory, all in support of OSINT information management. In addition to his work with the Dutch Defence and Intelligence Service, Arno established his own company "Reusers Information Services" in conjunction with his current position as head of OSINT. RIS primary goal is to teach Open Source Intelligence (systematic searching, finding and reporting with security in mind) and provide consultancy for government and private sector institutions worldwide. Arno has an extensive history of teaching OSINT, and OSINT training has been a core focus of his professional activities for decades. Today, he teaches OSINT, search strategies, information handling and security to a wide range of audiences. He travels
19
regularly to the United States, Switzerland, Austria, and United Kingdom to teach to a wide range of multilingual, multicultural audiences and is thus used to communicating with people from different backgrounds and possessing different language skills. Arno is a recognized expert on OSINT and speaks regularly at international conferences and workshops on the organization and maintenance of Open Source Intelligence Services, at home and abroad, for a diverse audience such as international organizations, government institutes, intelligence, military, and information professionals. Arno is the owner and maintainer of Reuser's New Repertorium, an online categorised annotated listing of intel sources and search engines. He also wrote his own multisearch search engine Isolde to enable building block search strategies, and is the owner and moderator of NEDBIB-L listserv discussion list with 2000 participants. Arno writes a regular column and has written journal articles and book chapters on OSINT.
20
Keynote
13:30-14:30 Chair:
Room: B101
Abstract
People and information entities in the real world are interconnected, forming complex, multiple social and information networks. There have been a lot of studies on mining single, independent, homogeneous social and information networks where objects and links are either treated as of the same type, such as friends linking with friends, or treated indiscriminatively, without structural or type distinction. However, real-world objects and links often belong to distinct types, such as students, professors, courses, departments, teach and advise in a university network, and such typed networks form multiple, structured, heterogeneous social and information networks. We explore methodologies on mining such structured multiple social and information networks and introduce several interesting new mining methodologies, including integrated ranking and clustering, classification, role discovery, data integration, data validation, and similarity search. We show that integrated mining of multiple interconnected social and information networks are powerful at uncovering critical knowledge hidden in large and multiple, interconnected networks.
Short Bio
Jiawei Han, Professor of Computer Science, University of Illinois at Urbana-Champaign. He has been researching into data mining, information network analysis, database systems, and data warehousing, with over 500 journal and conference publications. He has chaired or served on many program committees of international conferences, including PC co-chair for KDD, SDM, and ICDM conferences, and Americas Coordinator for VLDB conferences. He is currently the founding Editor-In-Chief of ACM Transactions on Knowledge Discovery from Data and as the Director of Information Network Academic Research Center supported by U.S. Army Research Lab. He is a Fellow of ACM and IEEE, and received 2004 ACM SIGKDD Innovations Award, 2005 IEEE Computer Society Technical Achievement Award, and 2009 IEEE Computer Society Wallace McDowell Award. His book "Data Mining: Concepts and Techniques" (2nd ed., Morgan Kaufmann, 2006) has been adopted as a textbook worldwide.
21
Keynote
Can Early Warning be Improved by Enhancing Open Source Intelligence through Better Exploitation of Societal Data and Information ?
Johnny Engell-Hansen Head of Operation Unit, Council of the European Union
09:00-10:00 Chair:
Room: B101
Abstract
Early warning as a concept can be applied to crises and crisis management in many different areas; political, economic, natural disasters, environmental, societal, health, etc. This presentation will focus on its application where the gradual destabilisation of a country or region has the potential to lead to societal unrest and/or violent conflict. The societal deterioration of a country or a region in principle goes through three phases: the stable phase, the fragile phase and the crisis phase. The methodology used to analyse and assess the evolution of societal status differs depending on the "phase". In the (relatively) stable phase the situation will typically be assessed by means of a number of pre-determined parameters - "indicators". The gradual deterioration of the building blocks, which under normal circumstances ensure a viable and cohesive society as well as good relations with neighbouring countries; e.g. political, ideological, cultural, religious, social, economic, etc. is tracked and compared. This model assumes that each parameter can fairly easily be monitored and scored. To a large extent the model can then be automated and almost mechanically applied. This way of situation monitoring can be described as the quantitative model. To determine the relative state-of-affairs in this phase each indicator is monitored and scored. The sum of scores will, in principle, tell us whether a crisis is approaching. And at least in theory - the extrapolation of deteriorating indicators enables the analyst to predict the breaking point, i.e. the point at which a crisis can be declared. If a sufficient number of parameters move from green to amber or red a crisis is per definition unfolding. The advantage of the quantitative model is that it can to a large degree be automated, enabling you to cover a large number of countries and situations with relatively modest resources. The disadvantage is that it is a fairly blunt instrument and experience has shown that the model will sometimes (often) fail to detect sudden, rapidly unfolding crises in a timely fashion. At the other end of the spectrum, the crisis phase, where the evolving crisis' breaking point is imminent, experience has shown that objective parameters - the indicators become more or less...
22
Short Bio
Within the EU External Action Service, Johnny Engell-Hansen is currently Head of Duty and Awareness Division in the EU Situation Centre and also Head of the EU Situation Room. Responsibilities include; monitoring and assessing world-wide events on a 24/7 basis; Early Warning and Crisis Response; alerting the EU High Representative, senior EU officials and EU Member States to politically significant events; Open Sources analyses; Deployable teams to ensure enhanced crisis information flow from theatre in a crisis situation; Provision of core infrastructures (human and material) to support EU policy level consultations and coordination in case the EU Emergency and Crisis Coordination Arrangements are triggered; and cooperation and information exchange with partners in EU institutions, EU Member States and other International Organisations. Johnny Engell-Hansen has participated in work to support the development of African Union "Continental Early Warning System". He has served as an adviser to the EU border management agency FRONTEX on the setting up of its own Situation Centre. Johnny Engell-Hansen has been a co-initiator in the creation of a platform for cooperation and information exchange between bodies within International Organisations responsible for "early warning" and "crisis response". He has played a leading role in the "Budapest Club"- a forum created to enhance the exploitation of Open Sources information among EU government institutions and has been a frequent speaker / participant in various conferences and workshops dealing with "Open Source Intelligence", "Early Warning" and "Crisis Response". Within the EU General Secretariat of the Council Johnny Engell-Hansen has previously held positions in departments dealing with Energy Policy and Organisational Development. In the framework of an exchange programme he was seconded to the German Federal Ministry of Foreign Affairs and the German Federal Ministry of Defence in 2002. Prior to joining the EU General Secretariat of the Council Johnny Engell-Hansen was a career officer in the Danish Armed Forces. He was, among other things, seconded to the EU Monitoring Mission in ex-Yugoslavia in 1993 where he served in Croatia, Bosnia-Herzegovina and Albania.
23
Keynote
13:30-14:30 Chair:
Room: B101
Abstract
In the current social network, a user may have hundreds of friends and find it very time consuming to categorize and tag every friend manually. When a user is going to initiate an activity by issuing a corresponding query, he/she needs to consider the relationship among candidate attendees to find a group of mutually close friends. Meanwhile, he/she also needs to consider the schedule of candidate attendees to find an activity period available for all attendees. It would certainly be desirable if the efficiency of such process is improved. In this talk, information query in social networks will be reviewed. We shall also introduce a novel social visualization system, SocFeedViewer, which is able to automatically cluster friends based on the number of mutual acquaintances and then systematically shows the social information, thus allowing users of having a whole picture quickly. When a user decides to initiate an activity among a cluster of friends, the user can further issue a Social-Temporal Group Query (STGQ), and the proposed algorithm STGSelect will return a group of attendees with minimum total social distance, together with a suitable time period which is available for all attendees. The STGQ is known to be an NP-hard problem; however, STGSelect is still able to find the optimal answer efficiently and reduce considerable processing time with proposed strategies.
Short Bio
Ming-Syan Chen received the B.S. degree in electrical engineering from National Taiwan University, Taipei, Taiwan, and the M.S. and Ph.D. degrees in Computer, Information and Control Engineering from The University of Michigan, Ann Arbor, MI, USA, in 1985 and 1988, respectively. He is now a Distinguished Research Fellow and the Director of Research Center of Information Technology Innovation (CITI) in the Academia Sinica, Taiwan, and is also a Distinguished Professor jointly appointed by EE Department, CSIE Department, and Graduate Institute of Communication Eng. (GICE) at National Taiwan University. He was a research staff member at IBM Thomas J. Watson Research Center, Yorktown Heights, NY, USA from 1988 to 1996, the Director of GICE from 2003 to 2006, and also the President/CEO of Institute for Information Industry (III), which is one of the largest organizations for information technology in Taiwan, from 2007 to 2008. His research interests include databases, data mining, cloud computing, and multimedia networking, and he has published more than 300 papers in his research areas. In addition to serving as program chairs/vice-chairs and keynote/tutorial speakers in many international conferences, Dr. Chen was an associate editor of IEEE TKDE, VLDB Journal, KAIS, and also JISE, is currently the Editor-in-Chief of the International Journal
24
of Electrical Engineering (IJEE), and is a Distinguished Visitor of IEEE Computer Society for Asia-Pacific from 1998 to 2000, and also from 2005 to 2007. Dr. Chen is now also serving as the Chief Executive Officer of Networked Communication Program, which is a national program coordinating several primary activities in information and communication technologies in Taiwan. He holds, or has applied for, eighteen U.S. patents and seven ROC patents in his research areas. He is a recipient of the Academic Award of the Ministry of Eduation, the NSC (National Science Council) Distinguished Research Award, Pan Wen Yuan Distinguished Research Award, Teco Award, Honorary Medal of Information, and K.-T. Li Research Breakthrough Award for his research work, and also the Outstanding Innovation Award from IBM Corporate for his contribution to a major database product. He was also elected as a Chair Professor by National Chung Hsing University. He received numerous awards for his research, teaching, inventions and patent applications. Dr. Chen is a Fellow of ACM and a Fellow of IEEE.
25
Conference Program
ASONAM 2011
26
1.
12:30-14:00 14:00-15:00
15:00-15:20 15:20-17:20
Yao-Hua Ho, Yao-Chuan Wu, Meng Chang Chen, Tsun-Jui Wen and Yeali S. Sun GPS Data Based Urban Guidance 2. Bi-Ru Dai, Chang-Yi Lee and Chih-Heng Chung A Framework of Recommendation System Based on both Network Structure and Messages 3. M. Saravanan, S. Buveneswari, S. Divya, and V. Ramya Bayesian Filters for Mobile Recommender Systems 4. Cheng-Ta Yang, Wen-Sheng Chang, Fan-Ning Cheng and Wei-Guang Teng Assessing Media Relevance via Eye Tracking 5. Jianhua Shao Mobile Engagement Session A4: Information Acquisition and Establishment of Social Networks Room 422 Session Chair: Prof. Chien-Hsing Wu 1. Mathilde Forestier, Julien Velcin and Djamel A. Zighed Extracting Social Networks to Understand Interaction 2. Baoshi Yan, Lokesh Bajaj and Anmol Bhasin Entity Resolution Using Social Graphs for Business Applications 3. Michael Farrugia, Neil Hurely and Aaron Quigley SNAP: Towards a Validation of the Social Network Assembly Pipeline 4. Antonio Rivero Ostoic Dyadic Patterns in Multiple Networks Lunch (Room 102, 103, 104) Keynote Speech 2 (Room B101) Chair: Prof. Tansel zyer Prof. Yutaka Matsuo, The University of Tokyo, Japan Title: Social Network Mining for People Search Coffee Break (Room 102, 103, 104) Parallel Sessions B Session B1: Recommendation (I) Room 418 Session Chair: Dr. Johann Stan 1. Yizhou Sun, Rick Barber, Manish Gupta, Charu Aggarwal and Jiawei Han Co-Author Relationship Prediction in Heterogeneous Bibliographic Networks 2. Nicola Barbieri Regularized Gibbs Sampling for User Profiling with Soft Constraints 3. Lin Chen, Richi Nayak and Yue Xu A Recommendation Method for Online Dating Networks Based on Social Relations and Demographic Information 4. Yin-Fu Huang and San-Des Lin Applying Multidimensional Association Rule Mining to Feedback-based Recommendation Systems 5. Kai-Yu Wang, Narongsak Thongpapanl, Hui-Ju Wu and I-Hsien Ting Identifying Structural Heterogeneities Between Online Social
27
Networks For Effective Word-of-Mouth Marketing 6. Stamatina Thomaidou and Michalis Vazirgiannis Multiword Keyword Recommendation System for Online Advertising Session B2: Privacy and Security Room 419 Session Chair: Prof. Guido Barbian 1. Bruce Kapron, Gautam Srivastava, and S. Venkatesh Social Network Anonymization via Edge Addition 2. Guido Barbian Assessing Trust by Disclosure in Online Social Networks 3. Mohammad A. Tayebi, Laurens Bakker, Uwe Glsser, and Vahid Dabbaghian Locating Central Actors in Co-offending Networks 4. Sean Chester and Gautam Srivastava Social Network Privacy for Attribute Disclosure Attacks 5. Hsin-Chang Yang and Chung-Hong Lee Post-Level Spam Detection for Social Bookmarking Web Sites 6. Kyung Soo Cho, Jae Yeol Yoon, Iee Joon Kim, Ji Yeon Lim and Ung-Mo Kim Mining Information of Anonymous User on a Social Network Service Session B3: Dynamic Social Networks (I) Room 420 Session Chair: Prof. Yu-Hui Tao 1. Darcy Davis, Ryan Lichtenwalter and Nitesh V. Chawla Multi-Relational Link Prediction in Heterogeneous Information Networks 2. Juan Lang and S. Felix Wu Social Network User Lifetime 3. Elsa Negre, Rokia Missaoui and Jean Vaillancourt Predicting Social Network Structure once a Node is Deleted 4. Tomoyuki Yuasa and Susumu Shirayama A New Analysis Method for Simulations Using Node Categorizations 5. Pei-Chun Ko and Vincent Buskens Dynamics of Adolescent Friendships: The Interplay between Structure and Gender 6. Usha Sridhar and Sridhar Mandyam Information Sources Driving Social Influence: A New Model for Belief Learning in Social Networks Session B4: (Workshop) Cyberpsychological Analysis of Social Network Analysis in Applications Room 422 Session Chair: Prof. Shiro Uesugi 1. Shiro Uesugi Effect of Personal Traits in the Usages of SNS 2. Yu-Lung Wu, Yu-Hui Tao, Ching-Pu Lee, Pei-Chi Yang and Guo-Shin Huang The Moderating Role of Virtual Community Cohesion and Critical Mass on the Link between Online-game Website Service Quality
28
18:30-21:00
and Play Satisfaction 3. M.C. Chang and S.D. Gregor Encouraging Participation in Virtual Community via Classified Facilitation Mechanisms 4. Chian-Hsueng Chao Reconceptualizing the Internet Human Flesh Search Mechanism: Review of the Literature 5. Chia Sung Yen, Shih Chun Yang, Tien Hui Yeh and Yi Inn Sun The Organizational Justice Strategies to Affect Learning Performance and Self-efficacy 6. Chienhsing Wu, Shuchen Kao, Jiwe Chang and Kaeying Chen A Comparison of Cognitive Styles on the Behavior of Obtaining Knowledge: Field Independence Vs. Field Dependence Conference Reception (Garden Villa Hotel)
29
12:00-13:30 13:30-14:30
Leveraging Online Social Network Data and External Data Sources to Predict Personality 4. Johann Stan, Viet-Hung Do and Pierre Maret Semantic User Interaction Profiles for Better People Recommendation 5. Kyong Jin Shim, Kuo-Wei Hsu, and Jaideep Srivastava Modeling Player Performance in Massively Multiplayer Online Role-Playing Games: The Effects of Diversity in Mentoring Network Session C3: Dynamic Social Networks (II) Room 420 Session Chair: Dr. Mi-Yen Yeh 1. Chien-Tung Ho, Cheng-Te Li and Shou-De Lin Modeling and Visualizing Information Propagation in a Micro-blogging Platform 2. Georgios Lappas From Web Mining to Social Multimedia Mining 3. Tuan-Anh Hoang, Ee-Peng Lim, Palakorn Achananuparp, Jing Jiang, and Loo-Nin Teow Modeling Socialness in Dynamic Social Networks 4. Michalis Rallis and Michalis Vazirgiannis Rank Prediction in Graphs with Locally Weighted Polynomial Regression and EM of Polynomial Mixture Models 5. Shahadat Uddin and Liaquat Hossain Time Scale Degree Centrality: A Time-Variant Approach to Degree Centrality Measures Session C4: Community Discovery and Analysis (I) Room 422 Session Chair: Prof. Hsin-Chang Yang 1. Manish Gupta, Charu Aggarwal, Jiawei Han and Yizhou Sun Evolutionary Clustering and Analysis of Bibliographic Networks 2. Piotr Brdka, Stanisaw Saganowski and Przemyslaw Kazienko Group Evolution Discovery in Social Networks 3. Slah Alsaleh, Richi Nayak and Yue Xu Finding and Matching Communities in Social Networks Using Data Mining 4. Christos Giatsidis, Dimitrios Thilikos and Michalis Vazirgiannis Evaluating Cooperation in Communities with the k-core Structure 5. Yang Yang, Yizhou Sun, Saurav Pandit, Nitesh Chawla and Jiawei Han Is Objective Function the Silver Bullet? A Case Study of Community Detection Algorithms on Social Networks Poster Session (Room 101) Lunch (Room 102, 103, 104) Keynote Speech 4 (Room B101) Chair: Prof. Vincent S. Tseng Professor Jiawei Han, University of Illinois at Urbana-Champaign, USA Title: Towards Integrated Mining of Multiple Social and Information Networks
30
14:30-18:30 19:00-21:30
Kaohsiung City Tour Conference Banquet and Best Paper Award (The Splendor Hotel)
31
3.
12:00-13:30 13:30-14:30
14:30-14:50 14:50-16:50
Liang-Cheng Huang, Tso-Jung Yen and Seng-Cho T. Chou Community Detection in Dynamic Social Networks: A Random Walk Approach 4. Ting-Lin Lee and In-Chen Tu The Way of Joining Consortia Leads to a Good Performance - A Case of Taiwan Bike Industry 5. Qi Ye, Bin Wu, Zhixiong Zhao and Bai Wang Detecting Link Communities in Massive Networks Session D4: Temporal Analysis on Social Network Topologies Room 422 Session Chair: Prof. Edgar Fuller 1. Chi Wang, Jie Tang, Jimeng Sun and Jiawei Han Dynamic Social Influence Analysis through Time-dependent Factor Graphs 2. Bo Yang, Jing Huang, and Dayou Liu A Random Network Ensemble Model Based Generalized Network Communities Mining Algorithm 3. Chung-Hong Lee, Hsin-Chang Yang, Tzan-Feng Chien and Wei-Shiang Wen A Novel Approach for Event Detection by Mining Spatio-temporal Information on Microblogs 4. Michele Berlingerio, Michele Coscia, Fosca Giannotti, Anna Monreale and Dino Pedreschi Foundations of Multidimensional Network Analysis 5. Michele Berlingerio, Michele Coscia and Fosca Giannotti Finding and Characterizing Communities in Multidimensional Networks Lunch (Room 102, 103, 104) Keynote Speech 6 (Room B101) Chair: Prof. Ambuj K. Singh Professor Ming-Syan Chen, Director, Research Center for Information Technology Innovation, Academia Sinica, Taiwan Title: Information Processing in Social Networks Coffee Break (Room 102, 103, 104) Parallel Sessions E Session E1: Application of SNA Room 418 Sesion Chair: Prof. Tansel zyer 1. Han-Chang Huang and Hung-Yu Kao CAIS: Community based Annotation Insight Search in a Folksonomy Network 2. Xiao Yu, Ang Pan, Lu-An Tang, Zhenhui Li, and Jiawei Han Geo-Friends Recommendation in GPS-based Cyber-Physical Social Network 3. Chen Liang, Sharath Hiremagalore, Angelos Stavrou and Huzefa Rangwala Predicting Network Response Times Using Social Information 4. Min-Feng Wang, Sie-Long Jheng, Meng-Feng Tsai and Cheng-Hsien Tang Enterprise Email Classification Based on Social Network Features 5. Onur Can Sert, Kayhan Dursun, and Tansel zyer
32
Ensemble of Multi-Objective Clustering Unified With H-Confidence Metric as Validity Metric Session E2: Misbehavior and Crime Detection Room 419 Session Chair: Dr. M. Saravanan 1. Jenq-Haur Wang and Ming-Sheng Lin Using Inter-Comment Similarity for Comment Spam Detection in Chinese Blogs 2. Ruaylong Lee, Roozbeh Nia, Jason Hsu, Karl N. Levitt, Jeff Rowe, S. Felix Wu, and Shaozhi Ye Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics 3. Fatih Ozgul, Claus Atzenbeck and Zeki Erdem How much Similar are Terrorists Networks of Istanbul? 4. M. Atif Qureshi, Arjumand Younus, Nasir Touheed, M. Shahid Qureshi, and Muhammad Saeed Discovering Irrelevance in the Blogosphere through Blog Search 5. Sarwat Nizamani, Nasrullah Memon, Uffe Kock Wiil and Panagiotis Karampelas CCM: A Text Classification Method by Clustering 6. Koji Maruhashi, Fan Guo and Christos Faloutsos MultiAspectForensics: Pattern Mining on Large-scale Heterogeneous Networks with Tensor Analysis Session E3: (Workshop) The 3rd International Workshop on Mining Social Networks for Decision Support Room 420 Session Chair: Prof. Yuan-Chu Hwang 1. I-Mei Lin and Yuan-Chu Hwang Exploring the Social Network Relationships on Hostility Behaviors 2. Pei-Shan Jang, I-Hsien Ting and Shyue-Liang Wang Towards Social Recommendation System Based on The Data from Microblogs 3. Yi-Ning Tu and Jia-Lang Seng Evaluating the Impact Power of Authors via Bayesian Estimation of Authors Social Connections 4. Chen-Shu Wang, I-Hsien Ting and Yu-Chieh Li Taiwan Academic Network Discussion via Social Networks Analysis Perspective 5. Qin Wu, Robert Duval, Edgar Fuller, Xingqin Qi, Cun-Quan Zhang, Arian Spahiu, and Kyle Christensen Modeling Network Changes: Systemic Centrality in Foreign Policy Interaction Analysis 6. Sreedhar Bhukya Discover Academic Experts in Novel Social Network Model Session E4: (Workshop) The First Workshop on Social Network Analysis in Applications (II) Room 422 Session Chair: Prof. Przemyslaw Kazienko 1. Krzysztof Jdrzejewski and Mikoaj Morzy
33
16:50-17:10 17:10-17:40
Opinion Mining and Social Networks: a Promising Match 2. Fang-Ling Lin and Guey-Fa Chiou Social Brokerage behind Knowledge Sharing 3. Wei-Lun Chang and Sian-Ting Lin Analyzing Personality Correlation of Social Network in Organizations 4. Arjumand Younus, M. Atif Qureshi, Fiza Fatima Asar, Muhammad Azam, Muhammad Saeed, and Nasir Touheed What do the Average Twitterers Say: a Twitter Model for Public Opinion Analysis in the Face of Major Political Events Coffee Break (Room 102, 103, 104) Closing Session (Room B101)
34
Conference Abstracts
ASONAM 2011
Session A1
10:50-12:30 Chair: Title Authors Abstract
35
graphs (such as email, twitter, blog graphs, etc.) have information content associated with their graph edges. In this paper we examine the link between information content and graph structure, proposing a new graph modeling approach, GC-Model, which combines both. We then apply this model to multiple real world communication graphs, demonstrating that the built models can be used effectively to predict future graph structure and information flow. On average, GC-Models top predictions covered 19% more of the actual future graph communication structure when compared to other previously introduced algorithms, far outperforming multiple link prediction methods and several naive approaches. Title Authors Abstract
Title
A Hybrid Approach to Discover MEC Interview Data - With the Hierarchical Value Map of Social Networking Sites as an Example
Yu-Chin Liu, Ti-Lin Chueh, and Yun-Shan Cheng As the booming of social network sites (SNSs), people adapt to communicate and share information via internet recently. According to great business opportunities emerging in SNSs, entrepreneurs strive to explore the potential needs inside users and then provide interesting feature functions on SNS platforms. The Means-End Chain (MECs) research method has been widely used to explore customers perceived values in selecting products [1]. It is a good approach to help entrepreneurs finding the most appreciated product features. But however, while adopting MECs, researchers suffer the hassle of defining Attribute, Consequence and Value elements (ACV elements) from interview data. In addition, such context analyzing work heavily relies on researchers subjective opinions, so that the research conclusions might be difficult to replicate and the contributions are limited. Therefore, this paper aims to propose hybrid miming techniques to automatically discover Attribute, Consequence and Value elements which are the most essential
Authors Abstract
36
components in MEC approach. A case on studying customers perceived values of social network cites is conducted by the proposed hybrid approach, and the experimental results show our method can discover the ACV elements effectively
Session A2
10:50-12:30 Chair: Title Authors Abstract
Automatic Tag Attachment Scheme for Efficient File Search in Peer-to-Peer File Sharing Systems
Ting Ting Qin and Satoshi Fujita In this paper, we consider the problem of automatic tag attachment to the documents distributed over a P2P network aiming at improving the efficiency of file search in such networks. The proposed scheme combines text clustering with a modified tag extraction algorithm, and is executed in a fully distributed manner. We conducted experiments to evaluate the accuracy of the proposed scheme. The result of experiments indicates that for more than 90% of documents, it attaches the same tags as the ones attached by human reviewers.
37
great flexibility in specifying approximately what they are looking for. We formally define the probability that a substitution satisfies a PS-query with respect to a graph database. We then present the PMATCH algorithm to answer such queries and prove its correctness. Our experimental evaluation demonstrates that PMATCH is efficient and scales to massive social networks with over a billion edges. Title Authors Abstract
Session A3
Room: 420
38
Abstract
In many metropolitan areas, traffic congestion is an escalating problem which causes a significant waste of money and time. Nowadays, cars equipped with GPS devices become widespread. The location information of those cars is very useful for estimate traffic condition in the complex city road network. Using the accurate and real time traffic condition, we can provide dynamic route guidance to ease traffic congestion. In this paper, we proposed a speed pattern model, called two phase piecewise linear speed model (2PEED), to estimate traffic condition and represent speed pattern in a road network using GPS data collected vehicles. With the estimated traffic condition and speed pattern, a proposed classification-based route guidance approach using machine learning technique provides dynamic routing for drivers. Using both current traffic data and the experience learned from history data, our route guidance approach is able to accurately predict the future traffic condition and selects a best route. We give simulation results to show that the proposed approach is able to select and dynamically update a route to prove drivers a best (e.g., less traffic and shortest travel time) route to their destination.
39
campaigns on selected groups of users to get useful feedback. Moreover, it improves customer loyalty towards the operator. We have evaluated our ndings through standard techniques on real world data. Title Authors Abstract
Mobile Engagement
Jianhua Shao Web of Things is a practice towards Internet of Things. It enables physical digital objects to be organised as web resources. Mobility enables mobile phones as a great media to engage people with operations to those extended web resources in Web of Things. Mobile engagements include three scopes with differences on networking and purposing. We illustrate each engagement with specific examples. Each engagement could complement each other to improve overall performance. In practice, apps are the actual implementations for mobile engagement. Meanwhile, privacy control of digital footprint needs to be explored further for mobile engagement because of data explosion in the Web of Things.
Session A4
Room: 422
40
and the text quotations relation. We present here the promising results we obtain, and the difficulties we face while extracting the quotations in this kind of textual content. These results are obtained from real data (from two information websites) which make the validation difficult. So, we create a validation protocol composed of two steps and based on human raters. Finally, we will see the objective of this work which is understanding interactions in order to extract the social roles of individuals. Title Authors Abstract
41
validate and invalidate different hypotheses we have about SNAP and suggests domain specific rule-sets for SNAP. Title Authors Abstract
Session B1
15:20-17:20 Chair: Title Authors Abstract
Recommendation (I)
July 25 (Monday) Dr. Johann Stan Room: 418
42
Validation tests on Movielens data show that the proposed approach outperforms significantly the variational version in terms of both prediction accuracy and learning time. Gibbs Sampling provides a simple and flexible learning procedure which can be extended to include external evidence, in the form of soft constraints. More specifically, given apriori information about user-neighbors, we propose an effective regularization technique that drives the first sampling iterations pushing the model towards a state which better represents the user-neighborhoods specified in input. Title Authors Abstract
A Recommendation Method for Online Dating networks based on Social Relations and Demographic Information
Lin Chen, Richi Nayak, and Yue Xu A new relationship type of social networks - online dating - are gaining popularity. With a large member base, users of a dating network are overloaded with choices about their ideal partners. Recommendation methods can be utilized to overcome this problem. However, traditional recommendation methods do not work effectively for online dating networks where the dataset is sparse and large, and a two-way matching is required. This paper applies social networking concepts to solve the problem of developing a recommendation method for online dating networks. We propose a method by using clustering, SimRank and adapted SimRank algorithms to recommend matching candidates. Empirical results show that the proposed method can achieve nearly double the performance of the traditional collaborative filtering and common neighbor methods of recommendation.
Identifying Structural Heterogeneities Between Online Social Networks For Effective Word-of-Mouth Marketing
Kai-Yu Wang, Narongsak Thongpapanl, Hui-Ju Wu, and I-Hsien Ting Social networks are extremely important for word-ofmouth (WOM)
43
marketing. However, marketers often ignore network structures when developing WOM marketing strategies. Specifically, there is clearly a lack of research on looking into overall structures and structural heterogeneities of social networks. This research investigates structural heterogeneities between online social networks in different product categories. We collected data from four online networks in different product categories from the most popular social networking site in Taiwan. Social network analysis was performed to understand the network structures. The findings demonstrate the structural heterogeneities between these networks and we also provide managerial implications for practitioners. Title Authors Abstract
Session B2
15:20-17:20 Chair: Title Authors Abstract
44
anonymization using a common approach. We start by showing that k-label sequence anonymity of arbitrary labeled graphs is hard, and use this result to prove NP-hardness results for many other recently proposed notions of graph anonymization. Secondly, we present interesting algorithms and hardness for bipartite graphs. For unlabeled bipartite graphs, we show k-degree anonymity is in P for all k 2. For labeled bipartite graphs, we show that k-label sequence anonymity is in P for k = 2 but it is NP-hard for k 3. Title Authors Abstract
45
Session B3
15:20-17:20 Chair:
46
47
Information Sources Driving Social Influence: A New Model for Belief Learning in Social Networks
Usha Sridhar and Sridhar Mandyam Non-Bayesian models for learning in social networks, such as the DeGroot model, are focused on updating beliefs using social influence weights, and study the achievement of convergence of beliefs to a consensus. In this paper, we propose a new construct to capture the notion of agents using additional information sources, such as media, to obtain multiple affirmations of belief information through an
48
information score. We use this new construct to create a feedback learning loop that allows agents to learn beliefs with social influences varying dynamically with the credibility of the information on such beliefs. We build a new social learning mechanism, without the constraining rowstochasticity assumptions on social influence, and show that with information sources driving social influences, the beliefs can converge, and not necessarily to a consensus, even with strong connectivity. In this process of learning agents with a similar alignment between exogenous information sources and beliefs group together, and this reflects in the structure of social influences. The results of the new learning algorithm are demonstrated on a small, fully connected social network.
Session B4
Title
The Moderating Role of Virtual Community Cohesion and Critical Mass on the Link between Online-Game Website Service Quality and Play Satisfaction
Yu-Lung Wu, Yu-Hui Tao, Ching-Pu Lee, Pei-Chi Yang, and Guo-Shin Huang The online game market in Taiwan is close to saturation. The sudden emergence of online community games has lead to a change in the type of game players, and online game providers are forced to deploy new strategies to cope with this change in trend. Meanwhile, literature research reveals a mixed result of the impact of virtual community cohesion and critical mass on online game platform service quality and satisfaction. Therefore, this research further investigates the moderating roles of online players virtual community cohesion and critical mass on the link between website service quality and player satisfaction. The result indicates that virtual community cohesion does play a moderating
Authors Abstract
49
role while critical mass does not. Discussions and implications are also provided in this paper. Title
Encouraging Participation in Virtual Community with Classified Facilitation Mechanisms: A Perspective from Online Communication Needs and Behaviors
M.C. Chang and S.D. Gregor Based on a literature review and three focused group sessions involving a total of 30 experienced designers of virtual community, this research examines design principles of computer-mediated facilitation mechanisms from the perspective of meeting participants online communication needs. The design principles are classified into three categories based on members intrapersonal, interpersonal and group communication needs and behaviors. The findings address the importance of understanding the different communication needs for individual participants when selecting facilitation mechanisms to encourage member participation in virtual communities. These findings yield innovative implications for research and practice.
Authors Abstract
Reconceptualizing the Internet Human Flesh Search Mechanism: Review of the Literature
Chian-Hsueng Chao The development of Internet technologies and popularity of social network enable the netizens to search, process, broadcast, and share information in a more efficient and collaborative way. Opinions of netizens in the cyberspace have emerged and become one of the major public opinions in the real world. One of the phenomenon rising recently over the Internet that most represent the influence between the virtual and real world is human flesh search (HFS). Usually, the HFS object is incompatible with social justice or violation of the mainstream moral characters, or events. This violation of moral triggers the HFS process either in the cyberspace or in the real world. HFS has arose numerous controversies, especially the dilemmas between privacy violation and public opinion. Literatures and studies of HSF are mainly from China. International journals or periodical literatures target on this issue are very few. In addition, current studies are mainly qualitative studies lacking of quantitative and theoretical model building and empirical research. Therefore, it is necessary to acquire better understanding of HSF structure and evolving process. The purpose of this paper is to provide a broad discussion and summarized attributes of HFS. Based on reviews of more than twenty journal papers and articles regarding HFS, this study hopes to formulate a reference framework for future HFS studies.
Title
The Organizational Justice Strategies to Affect Learning Performance and Self-efficacy : A Case study in Campus Media News Gathering
Chia Sung Yen, Shih Chun Yang, Tien Hui Yeh, and Yi Inn Sun It is important to perform teamwork with high organizational justice. When some unfair events happen, it is counterproductive not only to the
Authors Abstract
50
performance of the organization, but to organizational efficacy as well. Presses are time-conscious organizations, but they have to face the difficulty of resource distribution. The main purpose of this study is to examine organizational justice in presses. Because presses are so different from other organizations, there must be some kinds of important elements composing their organizational justice. In the procedure of news gathering, reporters always have to face the uncertainty of those events. If presses emphasize too much on the equity of distribution, it is possible that they may miss the deadline, or even lose the news. So presses seem to need another kind of evaluation to appraise their organizational justice. This paper would focus on the campus media, finding how students perform when they face the assignments of news gathering, and what strategies to do justice in this media could affect students self-efficacy. Title
A Comparison of Cognitive Styles on the Behavior of Obtaining Knowledge: Field Independence vs. Field Dependence
Chienhsing Wu, Shuchen Kao, Jiwe Chang, and Kaeying Chen This paper compares the cognitive style of field independence/dependence (FI, FD) on the behavior of obtaining knowledge from online learning system. The process of obtaining knowledge is considered with respect to the involvement of knowledge provider s and receiver s cognition characteristics. The experiment is conducted where two groups with FI for one and FD for another are arranged. Data analysis results indicate that (1) FI group spends more time on the designed KO than FD does. For non-designed KO, contrarily, the FD group has more time spent than FI group. (2) FI style is more likely to acquire knowledge from internal sources while FD prefers external where they can perform social interactions as the primary means to acquire knowledge. (3) FI group is likely monotonous to stick firmly with common or preferred passive knowledge resources; on the other hand, the learning process of FD group seems to be more varied, and often passing through in-between several different knowledge sources. Discussion and implications are also addressed.
Authors Abstract
Session C1
10:20-12:00 Chair: Title Authors Abstract
51
this problem from a perspective of community structure. We first find that through maximizing sample conductance, we can get high coverage sample. Based on this result, then, we propose a new decentralized search strategy named Conductance Search which tries to efficiently find the nodes belonging to different communities. We compare the strategy with other common strategies. And the results show that the conductance search outperforms others in number of steps to find the target and time complexity. Finally, we find some previous conclusions fail in many real-world networks and discuss network search-ability from the perspective of various structural properties. Title Authors Abstract
A Semantic and Multidisciplinary Model for Professional and Social Networks Analysis
Christophe Thovex and Francky Trichet By bridge-building between the classical models of social networks analysis, ontologies engineering and physics, our work defines a multidisciplinary model of professional social networks analysis, dedicated to human and social capital management in enterprises and institutions. We introduce a semantic process of social graphs static and dynamic analysis, based on the enterprise content and producing decisional tools for the performance management. This approach is in line with the SOCIOPRISE project, in partnership with a leader software engineering company for human capital management. SOCIOPRISE is funded by the French State Secretariat at the prospective and development of digital economy.
52
success of this microblogging platform and its relative freedom to perform malicious actions that can lead to identity or data theft. This work aims to propose a framework to assess suspicious behavior on Twitter. We present a tool developed for Scoring Suspicious Profiles On Twitter (SPOT 1.0) through a threedimensional indicator that involves the degree of aggressiveness, the visibility and the level of danger. Title Authors Abstract
53
situation. Our experiments on streamed semantic data from a social network show that by adding varying sets of context - like user information, sequential information or time information - the ranking of potential items can be personalized and the predictive performance can be improved. Title Authors Abstract
Leveraging Online Social Networks and External Data Sources to Predict Personality
Daniel Chapsky Over the past decade, people have been expressing more and more of their personalities online. Online social networks such as Facebook.com capture much of individuals personalities through their published interests, attributes and social interactions. Knowledge of an individuals personality can be of wide utility, either for social research, targeted marketing or a variety of other fields A key problem to predicting and utilizing personality information is the myriad of ways it is expressed across various people, locations and cultures. Similarly, a model predicting personality based on online data which cannot be extrapolated to real world situations is of limited utility for researchers. This paper presents initial work done on generating a probabilistic model of personality which uses representations of peoples connections to other people, places, cultures, and ideas, as expressed through Facebook. To this end, personality was predicted using a machine learning method known as a Bayesian Network. The model was trained using Facebook data combined with external data sources to allow further inference. The results of this paper present one predictive model of personality that this project has produced. This model demonstrates the potential of this methodology in two ways: First, it is able to explain up to 56% of all variation in a personality trait from a sample of 615 individuals. Second it is able to clearly present how this variability is explained through findings such as how to determine how agreeable a man is based on his age,
54
number of Facebook wall posts, and his willingness to disclose his preference for music made by Lady Gaga. Title Authors Abstract
Title
Modeling Player Performance in Massively Multiplayer Online Role-Playing Games: The Effects of Diversity in Mentoring Network
Kyong Jin Shim, Kuo-Wei Hsu, and Jaideep Srivastava This study investigates and reports preliminary findings on player performance prediction approaches which model player's past performance and social diversity in mentoring network in EverQuest II, a popular massively multiplayer online role-playing game (MMORPG) developed by Sony Online Entertainment. Our contributions include a better understanding of performance metrics used in the game and a foundation of recommendation systems for mentors and apprentices. We examined three different game servers from the EverQuest II game logs. In all three servers, the results from our analyses suggest that increase in social diversity in terms of characters and classes encountered moderately negatively correlates with player performance. Based on this finding, we built predictive models to predict player's future performance based on past performance and social diversity in terms of mentoring activities. Our results indicate that 1) models employing past performance and social diversity perform better and 2) prediction for mentors is generally better than that for apprentices.
Authors Abstract
Session C3
10:20-12:00 Chair: Title Authors Abstract
55
persons capability to disseminate ideas via a micro-blog. (2) How to measure the extent of propagation of a concept in a micro-blog. (3) How to demonstrate and visualize information propagation in a microblog. We propose methods to effectively measure each users ability to disseminate information via micro-blogs. The design of the measure considers three factors: (a) the number of people influenced; (b) the speed of propagation; and (c) the geographic distance of the propagation. We also provide an online demonstration micro-blog system that allows the users to explore the information propagation. The system shows the propagation paths and social graphs, influence scores, timelines, and geographical information among people for the user-given terms. Title Authors Abstract
Title
Rank Prediction in graphs with Locally Weighted Polynomial Regression and EM of Polynomial Mixture Models
Michalis Rallis and Michalis Vazirgiannis
Authors
56
Abstract
In this paper we describe a learning framework enabling ranking predictions for graph nodes based solely on individual local historical data. The two learning algorithms capitalize on the multi feature vectors of nodes in graphs that evolve in time. In the first case we use weighted polynomial regression (LWPR) while in the second we consider the Expectation Maximization (EM) algorithm to fit a mixture of polynomial regression models. The first method uses separate weighted polynomial regression models for each web page, while the second algorithm capitalizes on group behavior, thus taking advantage of the possible interdependence between web pages. The prediction quality is quantified as the similarity between the predicted and the actual rankings and compared to alternative baseline predictor. We performed extensive experiments on a real world data set (the Wikipedia graph). The results are very encouraging.
57
of the ability of the clustering process to summarize the network and provide insights into the changes in the objects over time. We present such a tightly integrated method for clustering and evolution diagnosis of heterogeneous bibliographic information networks. We present an algorithm, ENetClus, which performs such an agglomerative evolutionary clustering which is able to show variations in the clusters over time with a temporal smoothness approach. Previous work on clustering networks is either based on homogeneous graphs with evolution, or it does not account for evolution in the process of clustering heterogeneous networks. This paper provides the first framework for evolutionsensitive clustering and diagnosis of heterogeneous information networks. The ENetClus algorithm generates consistent typedclusterings across time, which can be used for further evolution diagnosis and insights. The framework of the algorithm is specifically designed in order to facilitate insights about the evolution process. We use this technique in order to provide novel insights about bibliographic information networks. Title Authors Abstract
58
interactions among its nodes. Community detection and evaluation is an important task in graph mining. A variety of measures have been proposed to evaluate the quality of such communities. In this paper, we evaluate communities based on the k-core concept, as means of evaluating their collaborative nature - a property not captured by the single node metrics or by the established community evaluation metrics. Based on the k-core, which essentially measures the robustness of a community under degeneracy, we extend it to weighted graphs, devising a novel concept of k-cores on weighted graphs. We applied the kcore approach on large real world graphs such as DBLP and report interesting results. Title Authors Abstract
Is Objective Function the Silver Bullet? A Case Study of Community Detection Algorithms on Social Networks
Yang Yang, Yizhou Sun, Saurav Pandit, Nitesh V. Chawla, and Jiawei Han Community detection or cluster detection in networks is a well-studied, albeit hard, problem. Given the scale and complexity of modern day social networks, detecting reasonable communities is an even harder problem. Since the first use of k-means algorithm in 1960s, many community detection algorithms have been invented - most of which are developed with specific goals in mind and the idea of detecting meaningful communities varies widely from one algorithm to another. With the increasing number of community detection algorithms, there has been an advent of a number of evaluation measures and objective functions such as modularity and internal density. In this paper we divide methods of measurements in to two categories, according to whether they rely on ground-truth or not. Our work is aiming to answer whether these general used objective functions are well consistent with the real performance of community detection algorithms across a number of homogeneous and heterogeneous networks. Seven representative algorithms are compared under various performance metrics, and on various real world social networks.
Session D1 (Workshop) The 1st International Workshop on Cloud Computing in Social Networks
10:20-12:00 Chair: Title Authors Abstract July 27 (Wednesday) Dr. Wen-Chih Tsai Room: 418
Constructing a Cloud Computing Based Social Networks Data Warehousing and Analyzing System
I-Hsien Ting, Chia-Hung Lin, and Chen-Shu Wang The research area of Social networks analysis has been recognized as extremely time-consuming tasks as well as large storage space is always necessary in order to store the social data, especially to deal with the data in the World Wide Web. Therefore, how to design an architecture and
59
environment for performing social networks analysis is very essential. In this paper, we proposed a data warehousing and analyzing system which is based on the concept of cloud computing. The system has also been implemented and evaluated under the proposed environment with different cloud computing approaches. Title Authors Abstract
Cloud Computing Architecture for Social Computing A Comparison Study of Facebook and Google
Bo-Wen Yang, Wen-Chih Tsai, An-Pin Chen, and Singh Ramandeep As far as we know, cloud computing is a new business model and the cloud computing architecture is the famous topic recently. Today, everyone enjoy the innovative search engine or social network application for new Internet services no longer require the large capital outlays in hardware to access those service or the human expense to operate it. Currently, Google is the largest search engine and Facebook is the largest social network in the Software as a Service (SaaS). But how them can support the huge requests from world thought each personal computer, mobile device, and smart phone. In this paper, we will try to analysis their backend cloud computing architecture to support future SaaS especially in large social network.
Building a Learning Games Network in Cloud Learning Platform based on Immigrant Education
Chien-Chih Tu and An-Pin Chen As with rapid growth of the computer technology, Elearning systems usually require many hardware and software resources, There are numerous educational institutions that cannot offer such investments, and cloud learning platform is the best solution for them. This paper proposes a model of using cloud computing and learning network upon cloud-learning solutions development. The cloud-learning platform combined with different types of games is gradually noticed by people because it can enhance user learning motivation. This research has developed a Chinese language cloud-learning system for the new immigrant based on games mode, and investigated the properties of game-based cloud-learning system, expecting to help more and more new immigrants in Taiwan. The basic concept for designing the system is developing the learning games network using digital materials, which is applied to the cloud learning platform to attract the immigrant residents and assist them to improve Chinese language skills.
Title
An Integrated Home Financial Investment Learning Environment to Exploit Cloud Computing for Social Network Analysis
Mao-Ping Wen, Hsio-Yi Lin, An-Pin Chen, and Chyan Yang This paper tried to apply cloud computing technology in social network analysis for a comprehensive home financial learning environment that individual investors may use as a reference in establishing web-based learning and investment platforms. The major contributions were described in three parts. First, this paper advanced the social network
Authors Abstract
60
analysis technology to be able to handle millions of nodes and links. Second, we demonstrate how cloud computing can be applied to advanced computing in social network. Third, we performed several intelligent analyses on a very popular social network, IHFILE, to identify some interesting and important features of it. In addition to analyzing a homogeneous social network such as IHFILE, we also propose direction of how cloud computing can be performed on a social network analysis as our future work.
Session D2 (Workshop) The First Workshop on Social Network Analysis in Applications (I)
10:20-12:00 Chair: Title Authors Abstract July 27 (Wednesday) Prof. Jason Jung Room: 419
Title
61
Authors Abstract
Dipankar Das and Sivaji Bandyopadhyay The paper presents an approach to identify the emotions of the bloggers on different topics provided in the Bengali blog documents. The rule based identification of emotion holders and topics along with their corresponding emotional expressions forms the baseline system. A Support Vector Machine (SVM) based supervised framework is also employed to identify the three components from the blog sentences and it outperforms the baseline system. As the topic of a document is not always conveyed at the sentence level, the similarity between a documents overall topic and sentential topic is measured through semantic clustering approach. Two different approaches are adopted to identify the many to many relationships among the holders and topics on Ekmans six emotions. One is based from the perspectives of the holders and other is with respect to topics. The two way evaluation of Ekmans six emotions achieves precision, recall and F-Score of 65.02%, 76.23% and 70.18% for 10 bloggers and 71.02%, 78.47% and 74.55% for 8 different topics on 512 test sentences respectively.
62
properties and degree distribution as the observed networks Title Authors Abstract
The Way of Joining Consortia leads to a good performance : A Case of Taiwan Bike Industry
Ting-Lin Lee and In-Chen Tu This The article use visually social network analysis (SNA) to present networking activities of Taiwans bike and components firms interacting in domestic market. The study uses data from questionnaires of sixty-five bike and component firms to explore the influence of organizational learning, relationship quality and network position on organizational performance. Results show that relationship quality positively affects organizational learning and organizational performance; and network position partially affects organizational performance. It is worth noted that a non-A-TEAM member (say IDEAL, coded GB_01) also had a higher in-degree and closeness centrality, and a better performance as well. Here is a key point to be re-thinking: is joining consortia the best way to lead a good performance? The answer is not fully supported by the case of Taiwans bike industry.
63
64
Experimental results on three different genres of data sets show that the proposed approaches can efficiently infer the dynamic social influence. The results are applied to the influence maximization problem, which aims to find a small subset of nodes (users) in a social network that could max- imize the spread of influence. Experiments show that the proposed approach can facilitate the application. Title Authors Abstract
A Random Network Ensemble Model Based Generalized Network Community Mining Algorithm
Bo Yang, Jing Huang, and Dayou Liu The ability to discover community structures from explorative networks is useful for many applications. Most of the existing methods with regard to community mining are specifically designed for assortative networks, and some of them could be applied to address disassortative networks by means of intentionally modifying the objectives to be optimized. However, the types of the explorative networks are unknown beforehand. Consequently, it is difficult to determine what specific algorithms should be used to mine appropriate structures from exploratory networks. To address this issue, a novel concept, generalized community structure, has been proposed with the attempt to unify the two distinct counterparts in both types of networks. Furthermore, based on the proposed random network ensemble model, a generalized community mining algorithm, so called G-NCMA, has been proposed, which is promisingly suitable for both types of networks. Its performance has been rigorously tested, validated and compared with other related algorithms against real-world networks as well as synthetic networks. Experimental results show the G-NCMA algorithm is able to detect communities, without any prior, from explorative networks with a good accuracy.
Title
65
Authors Abstract
Michele Berlingerio, Michele Coscia, Fosca Giannotti, Anna Monreale and Dino Pedreschi Complex networks have been receiving increasing attention by the scientific community, thanks also to the increasing availability of real-world network data. In the last years, the multidimensional nature of many real world networks has been pointed out, i.e. many networks containing multiple connections between any pair of nodes have been analyzed. Despite the importance of analyzing this kind of networks was recognized by previous works, a complete framework for multidimensional network analysis is still missing. Such a framework would enable the analysts to study different phenomena, that can be either the generalization to the multidimensional setting of what happens in monodimensional network, or a new class of phenomena induced by the additional degree of complexity that multidimensionality provides in real networks. The aim of this paper is then to give the basis for multidimensional network analysis: we develop a solid repertoire of basic concepts and analytical measures, which takes into account the general structure of multidimensional networks. We tested our framework on a real world multidimensional network, showing the validity and the meaningfulness of the measures introduced, that are able to extract important, nonrandom, information about complex phenomena.
Session E1
14:50-16:50
Application of SNA
July 27 (Wednesday) Room: 418
66
Title
67
Authors Abstract
Chen Liang, Sharath Hiremagalore, Angelos Stavrou, and Huzefa Rangwala Social networks and discussion boards have become a significant outlet where people communicate and express their opinion freely. Although the social networks themselves are usually well-provisioned, the participating users frequently point to external links to substantiate their discussions. Unfortunately, the sudden heavy traffic load imposed on the external, linked web sites causes them to become unresponsive leading to the Flash Crowds effect. In this paper, we quantify the prevalence of flash crowd events for a popular social discussion board (Digg). We measured the response times of 1289 unique popular websites. We were able to verify that 89% of the popular URLs suffered variations in their response times. By analyzing the content and structure of the social discussions, we were able to forecast accurately for 86% of the popular web sites within 5 minutes of their submission and 95% of the sites when more (5 hours) of social content became available. Our work indicates that we can effectively leverage social activity to forecast network events that will be otherwise infeasible to anticipate.
68
other content-based feature of email, our work shows that exploring social features is a promising direction to solve similar email classification problems. Title Authors Abstract
Session E2
14:50-16:50 Chair: Title Authors Abstract
Title
69
70
71
with successes on small, homogeneous network data are likely to fall short. We introduce MultiAspectForensics, a handy tool to automatically detect and visualize novel subgraph patterns within a local community of nodes in a heterogenous network, such as a set of vertices that form a dense bipartite graph whose edges share exactly the same set of attributes. We apply the proposed method on three data sets from distinct application domains, present empirical results and discuss insights derived from these patterns discovered. Our algorithm, built on scalable tensor analysis procedures, captures spectral properties of network data and reveals informative signals for subsequent domain-specific study and investigation, such as suspicious port-scanning activities in the scenario of cybersecurity monitoring.
Session E3
(Workshop) The 3rd International Workshop on Mining Social Networks for Decision Support
July 27 (Wednesday) Prof. Yuan-Chu Hwang Room: 420
72
in these websites and become places where full of marketing possibilities. Thus, it is an important issue to assist companies to understand the users in the social networking websites in order to enhance the accuracy and efficiency of target marketing. In this paper, we have proposed the architecture of a social recommendation system based on the data from microblogs. The social recommendation system is conducted according to the messages and social structure of target users. The similarity of the discovered features of users and products will then be calculated as the essence of the recommendation engine. A case study will be included to present how the recommendation system works based on real data that collected from Plurk. Title Authors Abstract
Evaluating the Impact Power of Authors via Bayesian Estimation of Authors Social Connections
Yi-Ning Tu and Jia-Lang Seng This study tries to detect the impact research topics from impact authors with their connections, that is, who have larger impact in the same research field. These topics are impact research topics the pursuit of which would be very valuable for researchers, especially for new scholars or for researchers who want to combine their original field with other new domains but who may not have enough background knowledge about the new field. Bayesian estimation in our model uses subjective data (published volume) as the prior distribution and objective data as the likelihood function (citation frequency) to predict the posterior distribution of the target which we called impact power. After finding the impact power of each paper or topic then filtering these papers and topics, we can find impact research topics or papers.
73
Session E4
E4: (Workshop) The First Workshop on Social Network Analysis in Applications (II)
74
Room: 422
75
conscientiousness as the primary formative indicator to converge into task groups. (3) Lover relationship takes partial personality similarity as the predominant phenomenon. The convergence of group personality will show comparatively obvious concentration. Title
What do the Average Twitterers Say: A Twitter Model for Public Opinion Analysis in the Face of Major Political Events
Arjumand Younus, M. Atif Qureshi, Fiza Fatima Asar, Muhammad Azam, Muhammad Saeed, and Nasir Touheed Social media platforms have become a forum for giving a voice to the masses with a significant proportion of those masses coming from the developing world. This was largely evidenced through the significant role played by social media platforms in the recent uprisings in the Arab world. In this paper, we take up a study of social media engagement patterns of users from the developing world through a study of Twitters role during the recent Tunisian uprising. Motivated by the results of a user survey conducted mainly for users from the developing world who tweeted heavily during the uprisings in the Arab world, we propose a novel method for subjectivity analysis of tweets corresponding to political events in the developing world. Our proposed method differs from previous subjectivity analysis approaches in that it is the first method that takes into account social features of social media platforms for the subjectivity classification task. Through experimental evaluations, we observe the accuracy of the proposed method to be 83.3% which demonstrates a promising outcome for large-scale application of our proposed subjectivity analysis technique.
Authors Abstract
76
Conference Posters
ASONAM 2011
Session
10:00-10:20 12:00-13:30 Chair: Title Authors Abstract
Poster
July 26 (Tuesday) Prof. Jeng-Shyang Pan Room: 101
An Association Model Based on Modus Operandi Mining for Implicit Crime Link Construction
Jau-Hwang Wang and Chien-Lung Lin Link analysis has been an important tool in crime investigation. Explicit or implicit social links, such as kinship, financial exchange, telephone connection, links derived from modus operandi, time of day, and geographic relationship, are often used to construct links between criminals. This paper proposes an association model based on modus operandi mining to establish links among crime cases and chronic criminals. Two data sets of robbery and residential burglary crime records were collected from a local police department and were used for experiment to evaluate the performance of the proposed approach.
77
topic word energy technolog* between 2001 and 2010 which is published by article type in English from web of science which contains SCI and SSCI database index. Based the cluster information, we analysis the distribution and the research fronts of international energy technology. Title Authors Abstract
78
generalization of the dense subgraph problem by an additional distance restriction to the nodes of the dense subgraph which is a quasi-clique in fact. We propose a new quasi-clique detection algorithm based on the definition of dense subgraph, and a novel optimization techniques based on idea of synchronization, which can prune the unpromising and redundant alien from the dense subgraph. The proposed methods could discover quasi-cliques and core players that are not shown in clique. Title Authors Abstract
Effects of Mentoring on Player Performance in Massively Multiplayer Online Role-Playing Games (MMORPGs)
Kyong Jin Shim, Kuo-Wei Hsu, and Jaideep Srivastava Massively Multiplayer Online Role-Playing Games (MMORPGs) have become increasingly popular and have communities comprising millions of subscribers. With their increasing popularity, researchers are realizing that video games can be a means to fully observe an entire isolated universe. In this study, we examine and report our findings on the effects of mentoring activities on player performance in EverQuest II, a popular MMORPG developed by Sony Online Entertainment.
Title
Towards Named Entity Recognition Method for Microtexts in Online Social Networks: a Case Study of Twitter
Jason Jung Given a certain question, named entity recognition (NER) methods can be an efficient strategy to extract relevant answers. The goal of this work is to extend NER methods for analyzing a set of microtexts, which are short text on online social media. To do so, we propose two contextual closure properties to discover contextual clusters of microtexts, which can be expected to improve the performance of NER tasks. Experimental results demonstrate the feasibility of the proposed method for extracting relevant information in online social network applications.
Authors Abstract
79
number of friends of real people), single identity with different evolutionary stages is linked together to a group that will help to ensure the number of attack edges [3]. Title
A Novel Approach for Developing Automatic Knowledge Construction and Diagnostic System for Tag-Based Learning Environment
Jun Ming Chen, Ying Ying Chen, Yeali S. Sun, and Meng Chang Chen With the advent of Web 2.0 technology, researchers have attempted to use Web 2.0 tools to develop adaptive and cooperative learning environments. However, in building learning and teaching diagnostic system, one of the major difficulties is the lack of prior knowledge to help learners read and understand what they read in articles. Moreover, because of the lack of a mechanism to assist teachers in monitoring the running activities and student progress, such that constructive suggestions can be given to the students and tutoring strategies can be improved accordingly. Therefore, this paper presents a framework for calculating semantically meaningful prior knowledge and generating spreading energy for discovering students reading status in semantic networks using a modified version of Semantic Analysis and Social Network techniques. An application to the development of a Tag-based Collaborative reading learning system is very useful for teachers and students.
Authors Abstract
Title
A Social Network Approach to Examine the Role of Influential Stocks in Shaping Interdependence Structure in Global Stock Markets
Ram B Roy and Uttam Sarkar This paper investigates the role of influential stocks in shaping the emergent system-level interdependence in global stock markets using a large set of stocks selected from major stock market indices from across the globe. We have proposed a method to identify influential stocks using various centrality measures used in social network analysis literature. Our study shows how these influential stocks provide key linkages in integrating the global stock markets as an interconnected system. We have also shown that the regional influence dominates over the economic sector influence in shaping the topological structure of stock market network. The study also captures the change in the topology of this network following the collapse of Lehman Brothers.
Authors Abstract
80
This social network represents the relationship among the authors in terms of information reference behavior. With the resulting network, the first algorithm computes each authors reputation value considering only direct referential activities while the second considers indirect activities as well. We discuss the reputation values computed by the two algorithms and compare them with the reputation ratings given by a human domain expert. We also analyze the social network through a community detection algorithm. We observed several interesting phenomena including the network being scale-free and having negative assortativity. Title
Private Information Transmission on the Consumer Generated Media: Information Privacy in the Japanese Context
Yohko Orito, Hitoshi Okada, and Hidenobu Sai This study examined private information transmissions on CGM/UGM websites from the perspective of the Japanese sense of information privacy. The characteristics of Japanese private information transmission on the CGM are described and discussed.
Authors Abstract
81
Conference Venue
ASONAM 2011
ASONAM 2011 will be held in National University of Kaohsiung (College of Management Building), Kaohsiung City, Taiwan. National University of Kaohsiung was founded in February 2000 under government auspices to achieve the balanced development of higher education between southern and northern Taiwan, and to help establish Taiwan as an Asia-Pacific Regional Operations Center. It is one of the leading academic institutions aiming for quality research and teaching in southern Taiwan. Currently the University has 5 colleges with a total of 19 departments, 27 master programs, and 3 doctoral programs, as well as 4 EMBA and 1 IMBA programs. For now, there is an enrollment of over 5,400 students and over 210 faculties.
Conference Site
82
July 25, 2011.
Conference Reception
Conference welcome reception will take place in Garden Villa Kaohsiung on 18:30-21:00,
Conference Banquet
Conference Banquet will be held in The Splendor Kaohsiung on 19:00-21:30, July 26, 2011. The banquet site is located in the highest building (The 85 Sky Tower) of Kaohsiung city with amazing view to the Kaohsiung Harbor.
Internet Service
Room 108 in the Building of College of Management is designated for Internet access room containing seats with power and Ethernet sockets. Free Wi-Fi service is also available around the conference site (Building of College of Management) and most of the campus area. Please use the username/password provided in your conference bag for accessing the Wi-Fi service.
83
84
College of Management 4F
85
The rapid increase in the interest in social networks has motivated the need for a more specialized venue with wider spectrum capable of meeting the needs and expectations of a variety of researchers and readers. Social Network Analysis and Mining (SNAM) is a multidisciplinary journal to serve both academia and industry as a main venue for a wide range of researchers and readers from social sciences, mathematical sciences, medical and biological sciences and computer science. The SNAM journal is proud to have an outstanding group of editors who widely and rigorously cover the multidisciplinary score of the journal. They are known to be research leaders in the field of social networks analysis and mining. Further, the SNAM journal is characterized by providing thorough constructive reviews by experts in the field and by the reduced turn-around time which allows research results to be disseminated and shared on timely basis. The target of the editors is to complete the first round of the refereeing process within about 8 to 10 weeks of submission. Accepted papers go to the online first list and are immediately made available for access by the research community. We look forward to receiving your submissions.
86
ASONAM
ASONAM: The 2012 International Conference on Advances in Social Networks Analysis and Mining
August 2629, 2012 http:// asonam2012.etu.edu.tr Istanbul, Turkey
Honorary Chairs
Erol Arkun Bilkent University Jiawei Han University of Illinois at Urbana-Champaign
The study of social networks originated in social and business communities. In recent years, social network research has advanced significantly; the development of sophisticated techniques for Social Network Analysis and Mining (SNAM) has been highly influenced by the online social Web sites, email logs, phone logs and instant messaging systems, which are widely analyzed using graph theory and machine learning techniques. People perceive the Web increasingly as a social medium that fosters interaction among people, sharing of experiences and knowledge, group activities, community formation and evolution. This has led to a rising prominence of SNAM in academia, politics, homeland security and business. This follows the pattern of known entities of our society that have evolved into networks in which actors are increasingly dependent on their structural embedding. The international conference on Advances in Social Network Analysis and Mining (ASONAM 2012) will primarily provide an interdisciplinary venue that will bring together practitioners and researchers from a variety of SNAM fields to promote collaborations and exchange of ideas and practices. ASONAM 2012 is intended to address important aspects with a specific focus on the emerging trends and industry needs associated with social networking analysis and mining. The conference solicits experimental and theoretical works on social network analysis and mining along with their application to real life situations. General areas of interest to ASONAM 2012 include information science and mathematics, communication studies, business and organizational studies, sociology, psychology, anthropology, applied linguistics, biology and medicine. More specialized topics within ASONAM include, but are not limited to:
Anomaly detection in social network evolution Application of social network analysis Application of social network mining Communities discovery and analysis in large scale online social networks Communities discovery and analysis in large scale offline social networks Connection between biological similarities and social network formulation Contextual social network analysis Contextual social network mining Crime data mining and network analysis Cyber anthropology Dark Web Data protection inside communities Detection of communities by document analysis Dynamics and evolution patterns of social networks Economical impact of social network discovery Evolution of patterns in the Web Evolution of communities in the Web Evolution of communities in organizations Geography of social networks Impact of social networks on recommendations systems Information acquisition and establishment of social relations Influence of cultural aspects on the formation of communities Knowledge networks Large-scale graph algorithms for social network analysis Misbehavior detection in communities Migration between communities Multi-agent based social network modeling and analysis Open source intelligence Pattern presentation for end-users and experts Personalization for search and for social interaction Preparing data for Web mining Political impact of social network discovery Privacy, security and civil liberty issues Recommendations for product purchase, information acquisition and establishment of social relations Recommendation networks Scalability of social networks Scalability of Search algorithms on social networks Social and cultural anthropology Social geography Social psychology of information diffusion Temporal analysis on social networks topologies Visual representation of dynamic social networks Web mining algorithms Web communities
General Co-Chairs
Fazli Can Bilkent University Kathleen Carley Carnegie Mellon University Irwin King The Chinese University of Hong Kong Philip S. Yu University of Illinois at Chicago
Program Co-Chairs
Fakhri Karray University of Warerloo Faruk Polat Middle East Technical University
Sponsorship Co-Chairs
Hanghang Tong IBM T.J. Watson Research Center
Tutorials Co-Chairs
Ralf Klamma RWTH Aachen University Huan Liu Arizona State University Jie Tang Tsinghua University
Workshop Co-Chairs
VS Subrahmanian University of Maryland I-Hsien Ting National University of Kaohsiung
Publicity Co-Chairs
Mehmet Kaya Firat University Keivan Kianmehr University of Western Ontario Ee-Peng Lim Singapore Management University Mohamad Nagi University of Bradford
Instructions for Authors Papers reporting original and unpublished research results pertaining to the above topics are solicited (Proceeding indexed by EI). Full paper submission deadline is March 15, 2012. These papers will follow an academic review process. Full paper manuscripts must be in English with a maximum length of 8 pages (using the IEEE two-column template). Submissions should include the title, author(s), affiliation(s), e-mail address(es), tel/fax numbers, abstract, and postal address(es) on the first page. Papers should be submitted to the conference Web site: asonam2012.etu.edu.tr. If Web submission is not possible, manuscripts should be sent as an attachment via email to [email protected] by March 15, 2012. The attachment must be in PDF or Word .doc format. Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Authors should certify that their papers represent substantially new previously unpublished work. Paper submission implies that the intent is for one of the authors to present the paper if accepted and that at least one of the authors must register for a full conference fee and attend the conference to present the paper.
Publications Co-Chairs
Panagiotis Karampelas Hellenic American University Jon Rokne University of Calgary
Registration Co-Chairs
Tansel zyer Mehmet Tan
Web Chair
Mehmet Tan TOBB Economics and Technology University
87
Oct 2011 Nov Dec Jan Feb 2012 Mar Apr May Jun Jul
88
89