Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Information Systems (H) > Information Storage And Retrieval (H.3) > Systems And Software (H.3.4) > Social Networking (H.3.4...)  
  1-10 of 109 Reviews about "Social Networking (H.3.4...)": Date Reviewed
  Beyond social graphs: mining patterns underlying social interactions
Baldominos A., Calle J., Cuadra D.  Pattern Analysis & Applications 20(1): 269-285, 2017. Type: Article

Reliable recommendation systems are the holy grail of Internet research these days. They suggest new links to social network users. Because the attractiveness of a social network depends on the number of nodes and links composing it, the more node...

Jul 26 2017
  The role of digital technologies during relationship breakdowns
Moncur W., Gibson L., Herron D.  CSCW 2016 (Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, San Francisco, CA,  Feb 27-Mar 2, 2016) 371-382, 2016. Type: Proceedings

The increasing use of digital technology for interpersonal communication and for the storage of family archival material necessitates a deeper theoretical and empirical understanding of the interaction between social processes and digital technolo...

Jul 5 2017
  Identifying and ranking cultural heritage resources on geotagged social media for smart cultural tourism services
Nguyen T., Camacho D., Jung J.  Personal and Ubiquitous Computing 21(2): 267-279, 2017. Type: Article

Besides much research on social media-based smart tourism applications, the authors introduce a novel approach to research focusing on cultural tourism. They effectively present the base of their research through an introduction section and releva...

Jun 1 2017
  A general recommendation model for heterogeneous networks
Pham T., Li X., Cong G., Zhang Z.  IEEE Transactions on Knowledge and Data Engineering 28(12): 3140-3153, 2016. Type: Article

Recommenders take data, analyze it, and on the basis of these results offer recommendations to end users about the decisions to make: which restaurant would be the most appropriate considering their preferences and location, what concert to attend...

May 9 2017
  The power of networks: six principles that connect our lives
Brinton C., Chiang M.,  Princeton University Press, Princeton, NJ, 2016. 328 pp. Type: Book (978-0-691170-71-8)

Christopher Brinton and Mung Chiang have taught an online course on networks to more than 100,000 students around the world using the Coursera platform since 2013 [1]. This course was based on a previous course taught by Mung Chiang at Princeton a...

May 8 2017
  Inferring directions of undirected social ties
Zhang J., Wang C., Wang J., Yu J., Chen J., Wang C.  IEEE Transactions on Knowledge and Data Engineering 28(12): 3276-3292, 2016. Type: Article

With the advent of social networks, there are many opportunities available for researchers to research and analyze social ties. This is especially true with social networking sites like LinkedIn. In this paper, the authors aim to analyze the direc...

Apr 26 2017
  Fraud analytics using descriptive, predictive, and social network techniques: a guide to data science for fraud detection
Baesens B., Van Vlasselaer V., Verbeke W.,  Wiley Publishing, Hoboken, NJ, 2015. 400 pp. Type: Book (978-1-119133-12-4)

The general scope of fraud analytics comprises a set of both conceptual approaches and appropriate tools for detecting certain anomalies in processes that can be associated with fraud. Fraud can occur in several business domains, spanning from ban...

Mar 15 2017
  Retrieving the maximal time-bounded positive influence set from social networks
Shi T., Cheng S., Cai Z., Li Y., Li J.  Personal and Ubiquitous Computing 20(5): 717-730, 2016. Type: Article

The spread of information about products, ideas, and behaviors, and their adoption, is an important tool in viral marketing and communication strategies in politics. Shi et al. assume that social networks play a unique role in this process, and th...

Nov 15 2016
  A trust evaluation scheme for complex links in a social network: a link strength perspective
Li M., Xiang Y., Zhang B., Huang Z., Zhang J.  Applied Intelligence 44(4): 969-987, 2016. Type: Article

As links among users are the channel for interchanging information inside social networks, trust is a widely accepted indicator or parameter to discover and analyze potential security threats. This work proposes a trust evaluation schema for socia...

Nov 10 2016
  Characteristics of social media stories
AlNoamany Y., Weigle M., Nelson M.  International Journal on Digital Libraries 17(3): 239-256, 2016. Type: Article

Through its portrayal of social media in an archival review, this paper attempts to decipher “what makes a story good.” In order to do this, the paper identifies popular “human-generated” posts. The concept that a timeline ...

Nov 9 2016
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy