Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ASONAM
ASONAM 2016
Generate Citations
2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
Aug. 18 2016 to Aug. 21 2016
San Francisco, CA, USA
Table of Contents
[Title page]
Freely available from IEEE.
pp. 1-1
[Title page]
Freely available from IEEE.
pp. 1-1
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Table of contents
Freely available from IEEE.
pp. i-xvii
ASONAM 2016: Message from steering chair
Freely available from IEEE.
pp. xviii-xix
Message from IEEE/ACM ASONAM 2016 general chairs
Freely available from IEEE.
pp. xx-xxi
Welcome from the ASONAM 2016 program chairs
Freely available from IEEE.
pp. xxii-xxii
ASONAM 2016 organizing committee
Freely available from IEEE.
pp. xxiii-xxiv
ASONAM 2016 program committee
Freely available from IEEE.
pp. xxv-xxvii
FOSINT-SI 2016 symposium organizing committee
Freely available from IEEE.
pp. xxviii-xxix
HI-BI-BI 2016 organizing committee
Freely available from IEEE.
pp. xxx-xxxi
FAB 2016 symposium organizing committee
Freely available from IEEE.
pp. xxxii-xxxiv
SNAA 2016 organizing committee
Freely available from IEEE.
pp. xxxv-xxxv
MSNDS 2016 organizing committee
Freely available from IEEE.
pp. xxxvi-xxxvi
DyNo 2016 organizing committee
Freely available from IEEE.
pp. xxxvii-xxxvii
SNAST 2016 organizing committee
Freely available from IEEE.
pp. xxxviii-xxxviii
SI 2016 organizing committee
Freely available from IEEE.
pp. xxxix-xxxix
Four Keynote speeches [2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining]
Full-text access may be available. Sign in or learn about subscription options.
pp. xl-xliii
by
Brian Uzzi
,
Lise Getoor
,
Evimaria Terzi
,
Lada Adamic
ASONAM 2016 tutorials: Tutorial 1: Evolutionary computation for community detection in complex networks
Freely available from IEEE.
pp. xliv-xlvi
by
Clara Pizzuti
,
Marc A. Smith
,
Harald Meier
,
Srijan Kumar
,
Francesca Spezzano
,
V. S. Subrahmanian
ASONAM 2016 panel: Social network analysis for social good
Freely available from IEEE.
pp. xlvii-xlvii
by
V S Subrahmanian
,
Lada Adamic
,
Lise Getoor
,
Evimaria Terzi
,
Brian Uzzi
,
Lisa Singh
Technical papers
Freely available from IEEE.
pp. xlix-xlix
ASONAM 2016: Author index
Freely available from IEEE.
pp. 1441-1448
Influence based analysis of community consistency in dynamic networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Xiaowei Jia
,
Xiaoyi Li
,
Nan Du
,
Yuan Zhang
,
Vishrawas Gopalakrishnan
,
Guangxu Xun
,
Aidong Zhang
Stop Clickbait: Detecting and preventing clickbaits in online news media
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-16
by
Abhijnan Chakraborty
,
Bhargavi Paranjape
,
Sourya Kakarla
,
Niloy Ganguly
Streaming METIS partitioning
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-24
by
Ghizlane Echbarthi
,
Hamamache Kheddouci
New stopping criteria for spectral partitioning
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-32
by
James P Fairbanks
,
Anita Zakrzewska
,
David A Bader
Local triangle-densest subgraphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-40
by
Raman Samusevich
,
Maximilien Danisch
,
Mauro Sozio
Tradeoffs between density and size in extracting dense subgraphs: A unified framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-48
by
Zhefeng Wang
,
Lingyang Chu
,
Jian Pei
,
Abdullah Al-Barakati
,
Enhong Chen
Non-sharing communities? An empirical study of community detection for access control decisions
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-56
by
Gaurav Misra
,
Jose M. Such
,
Hamed Balogun
Functional cluster extraction from large spatial networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-62
by
Takayasu Fushimi
,
Kazumi Saito
,
Tetsuo Ikeda
,
Kazuhiro Kazama
Network completion via joint node clustering and similarity learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-68
by
Dimitrios Rafailidis
,
Fabio Crestani
Sensitivity and reliability in incomplete networks: Centrality metrics to community scoring functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-72
by
Soumya Sarkar
,
Suhansanu Kumar
,
Sanjukta Bhowmick
,
Animesh Mukherjee
Ensemble-based algorithms to detect disjoint and overlapping communities in networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-80
by
Tanmoy Chakraborty
,
Noseong Park
,
V.S. Subrahmanian
Community detection in political Twitter networks using Nonnegative Matrix Factorization methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-88
by
Mert Ozer
,
Nyunsu Kim
,
Hasan Davulcu
On predicting social unrest using social media
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-95
by
Rostyslav Korolov
,
Di Lu
,
Jingjing Wang
,
Guangyu Zhou
,
Claire Bonial
,
Clare Voss
,
Lance Kaplan
,
William Wallace
,
Jiawei Han
,
Heng Ji
Notice of Removal: Characterizing communal microblogs during disaster events
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-99
by
Koustav Rudra
,
Ashish Sharma
,
Niloy Ganguly
,
Saptarshi Ghosh
Investigating the complete corpus of referendum and elections tweets
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-105
by
Despoina Antonakaki
,
Dimitris Spiliotopoulos
,
Christos V. Samaras
,
Sotiris Ioannidis
,
Paraskevi Fragopoulou
Understanding citizen reactions and Ebola-related information propagation on social media
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-111
by
Thanh Tran
,
Kyumin Lee
Estimating exponential random graph models using sampled network data via graphon
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-119
by
Ran He
,
Tian Zheng
Rank degree: An efficient algorithm for graph sampling
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-129
by
Elli Voudigari
,
Nikos Salamanos
,
Theodore Papageorgiou
,
Emmanuel J. Yannakoudakis
Query-friendly compression of graph streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-137
by
Arijit Khan
,
Charu Aggarwal
Classification in dynamic streaming networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-145
by
Yibo Yao
,
Lawrence B. Holder
Social network dominance based on analysis of asymmetry
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-151
by
Yuemeng Li
,
Xintao Wu
,
Song Yang
MaxReach: Reducing network incompleteness through node probes
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-157
by
Sucheta Soundarajan
,
Tina Eliassi-Rad
,
Brian Gallagher
,
Ali Pinar
Predicting anchor links between heterogeneous social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-163
by
Sina Sajadmanesh
,
Hamid R. Rabiee
,
Ali Khodadadi
Benchmarking online social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-169
by
Pablo Nicolás Terevinto
,
Miguel Pérez
,
Josep Domenech
,
José A. Gil
,
Ana Pont
On the δ-Hyperbolicity in complex networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-173
by
Hend Alrasheed
Why not scale free? Simulating company ego networks on Twitter
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-177
by
Yoav Achiam
,
Inbal Yahav
,
David G. Schwartz
Joining user profiles across online social networks: From the perspective of an adversary
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-185
by
Qiang Ma
,
Han Hee Song
,
S. Muthukrishnan
,
Antonio Nucci
Prediction of cyberbullying incidents in a media-based social network
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-192
by
Homa Hosseinmardi
,
Rahat Ibn Rafiq
,
Richard Han
,
Qin Lv
,
Shivakant Mishra
Hiding in plain sight: Characterizing and detecting malicious Facebook pages
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-196
by
Prateek Dewan
,
Shrey Bagroy
,
Ponnurangam Kumaraguru
Detecting malicious campaigns in crowdsourcing platforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-202
by
Hongkyu Choi
,
Kyumin Lee
,
Steve Webb
Trust and privacy correlations in social networks: A deep learning framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-206
by
Shatha Jaradat
,
Nima Dokoohaki
,
Mihhail Matskin
,
Elena Ferrari
NimbleCore: A space-efficient external memory algorithm for estimating core numbers
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-214
by
Priya Govindan
,
Sucheta Soundarajan
,
Tina Eliassi-Rad
,
Christos Faloutsos
All-pairs shortest distances maintenance in relational DBMSs
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-222
by
Sergio Greco
,
Cristian Molinaro
,
Chiara Pulice
,
Ximena Quintana
Togetherness: An algorithmic approach to network integration
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-230
by
Anastasia Moskvina
,
Jiamou Liu
On the guarantee of containment probability in influence minimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-238
by
Chien-Wei Chang
,
Mi-Yen Yeh
,
Kun-Ta Chuang
Intertwined viral marketing in social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-246
by
Jiawei Zhang
,
Senzhang Wang
,
Qianyi Zhan
,
Philip S. Yu
Analyzing information sharing strategies of users in online social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-254
by
Dong-Anh Nguyen
,
Shulong Tan
,
Ram Ramanathan
,
Xifeng Yan
Learning cascaded influence under partial monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-262
by
Jie Zhang
,
Jiaqi Ma
,
Jie Tang
Community-based delurking in social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-270
by
Roberto Interdonato
,
Chiara Pulice
,
Andrea Tagarelli
Percimo: A personalized community model for location estimation in social media
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-278
by
Guangchao Yuan
,
Pradeep K. Murukannaiah
,
Munindar P. Singh
Community-based geospatial tag estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-286
by
Wei Niu
,
James Caverlee
,
Haokai Lu
,
Krishna Kamath
Exploiting spatial-temporal-social constraints for localness inference using online social media
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-294
by
Chao Huang
,
Dong Wang
Co-location social networks: Linking the physical world and cyberspace
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-298
by
Huandong Wang
,
Yong Li
,
Yang Chen
,
Yue Wang
,
Jian Yuan
,
Depeng Jin
Network classification using adjacency matrix embeddings and deep learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-306
by
Ke Wu
,
Philip Watters
,
Malik Magdon-Ismail
Weakly hierarchical lasso based learning to rank in best answer prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 307-314
by
Qiongjie Tian
,
Baoxin Li
Priority rank model for social network generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-318
by
Mikołaj Morzy
,
Przemysław Kazienko
,
Tomasz Kajdanowicz
An information theoretic approach to generalised blockmodelling for the identification of meso-scale structure in networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-322
by
Neil Hurley
,
Erika Duriakova
Bayesian model selection of stochastic block models
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-328
by
Xiaoran Yan
Dynamic community detection based on distance dynamics
Full-text access may be available. Sign in or learn about subscription options.
pp. 329-336
by
Qian Guo
,
Lei Zhang
,
Bin Wu
,
Xuelin Zeng
Enumerating maximal cliques in temporal graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-344
by
Anne-Sophie Himmel
,
Hendrik Molter
,
Rolf Niedermeier
,
Manuel Sorge
Structural measures of clustering quality on graph samples
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-348
by
Jianpeng Zhang
,
Yulong Pei
,
George H. L. Fletcher
,
Mykola Pechenizkiy
A local measure of community change in dynamic graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-353
by
Anita Zakrzewska
,
Eisha Nathan
,
James Fairbanks
,
David A Bader
A parameter-free method for detecting local communities based on attainable information
Full-text access may be available. Sign in or learn about subscription options.
pp. 354-357
by
Ardavan Afshar
,
Mansour Zolghadri Jahromi
,
Ali Hamzeh
Web user profiling using data redundancy
Full-text access may be available. Sign in or learn about subscription options.
pp. 358-365
by
Xiaotao Gu
,
Hong Yang
,
Jie Tang
,
Jing Zhang
Can i foresee the success of my meetup group?
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-373
by
Soumajit Pramanik
,
Midhun Gundapuneni
,
Sayan Pathak
,
Bivas Mitra
Subconscious Crowdsourcing: A feasible data collection mechanism for mental disorder detection on social media
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-379
by
Chun-Hao Chang
,
Elvis Saravia
,
Yi-Shin Chen
An analysis of student behavior in two massive open online courses
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-385
by
James Schaffer
,
Brandon Huynh
,
John O'Donovan
,
Tobias Höllerer
,
Yinglong Xia
,
Sabrina Lin
Personality homophily and the local network characteristics of facebook
Full-text access may be available. Sign in or learn about subscription options.
pp. 386-393
by
Nyala Noe
,
Roger M. Whitaker
,
Stuart M. Allen
Downside management in recommender systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-401
by
Huan Gui
,
Haishan Liu
,
Xiangrui Meng
,
Anmol Bhasin
,
Jiawei Han
Collaborative restricted Boltzmann machine for social event recommendation
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-405
by
Xiaowei Jia
,
Xiaoyi Li
,
Kang Li
,
Vishrawas Gopalakrishnan
,
Guangxu Xun
,
Aidong Zhang
Twitter message recommendation based on user interest profiles
Full-text access may be available. Sign in or learn about subscription options.
pp. 406-410
by
Raheleh Makki
,
Axel J. Soto
,
Stephen Brooks
,
Evangelos E. Milios
Generating risk reduction recommendations to decrease vulnerability of public online profiles
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-416
by
Janet Zhu
,
Sicong Zhang
,
Lisa Singh
,
Grace Hui Yang
,
Micah Sherr
Exploring influence among participants for event recommendation
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-420
by
Yi Liao
,
Xinshi Lin
,
Wai Lam
From migration corridors to clusters: The value of Google+ data for migration studies
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-428
by
Johnnatan Messias
,
Fabricio Benevenuto
,
Ingmar Weber
,
Emilio Zagheni
How fashionable is each street?: Quantifying road characteristics using social media
Full-text access may be available. Sign in or learn about subscription options.
pp. 429-436
by
Takuya Nishimura
,
Kyosuke Nishida
,
Hiroyuki Toda
,
Hiroshi Sawada
From event detection to storytelling on microblogs
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-442
by
Janani Kalyanam
,
Sumithra Velupillai
,
Mike Conway
,
Gert Lanckriet
Authorship identification in Bengali language: A graph based approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 443-446
by
Tanmoy Chakraborty
,
Prasenjit Choudhury
Finding needles of interested tweets in the haystack of Twitter network
Full-text access may be available. Sign in or learn about subscription options.
pp. 447-452
by
Qiongjie Tian
,
Jashmi Lagisetty
,
Baoxin Li
Social badge system analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 453-460
by
Jiawei Zhang
,
Xiangnan Kong
,
Philip S. Yu
A first look at user activity on tinder
Full-text access may be available. Sign in or learn about subscription options.
pp. 461-466
by
Gareth Tyson
,
Vasile C. Perta
,
Hamed Haddadi
,
Michael C. Seto
New to online dating? Learning from experienced users for a successful match
Full-text access may be available. Sign in or learn about subscription options.
pp. 467-470
by
Mo Yu
,
Xiaolong Zhang
,
Derek Kreager
Dynamics of large scale networks following a merger
Full-text access may be available. Sign in or learn about subscription options.
pp. 471-476
by
John Clements
,
Babak Farzad
,
Henryk Fukś
The collapse of the Friendster network started from the center of the core
Full-text access may be available. Sign in or learn about subscription options.
pp. 477-484
by
Kazunori Seki
,
Masataka Nakamura
Targeting algorithms for online social advertising markets
Full-text access may be available. Sign in or learn about subscription options.
pp. 485-492
by
Chaolun Xia
,
Saikat Guha
,
S. Muthukrishnan
Correlations of consumption patterns in social-economic networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 493-500
by
Yannick Leo
,
Márton Karsai
,
Carlos Sarraute
,
Eric Fleury
Analysis of rewards on reward-based crowdfunding platforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 501-504
by
Yusan Lin
,
Wang-Chien Lee
,
Chung-Chou H. Chang
Heuristics for advertising revenue optimization in Online Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 505-509
by
Inzamam Rahaman
,
Patrick Hosein
Emotion -and area-driven topic shift analysis in social media discussions
Full-text access may be available. Sign in or learn about subscription options.
pp. 510-518
by
Kamil Topal
,
Mehmet Koyuturk
,
Gultekin Ozsoyoglu
Showing 100 out of 256
Load More
Load All