Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Information Systems (H) > Information Storage And Retrieval (H.3) > Systems And Software (H.3.4) > Social Networking (H.3.4...)  
 
Options:
 
  1-10 of 107 Reviews about "Social Networking (H.3.4...)": Date Reviewed
  Identifying and ranking cultural heritage resources on geotagged social media for smart cultural tourism services
Nguyen T., Camacho D., Jung J.  Personal and Ubiquitous Computing 21(2): 267-279, 2017. Type: Article

Besides much research on social media-based smart tourism applications, the authors introduce a novel approach to research focusing on cultural tourism. They effectively present the base of their research through an introduction section and releva...

Jun 1 2017
  A general recommendation model for heterogeneous networks
Pham T., Li X., Cong G., Zhang Z.  IEEE Transactions on Knowledge and Data Engineering 28(12): 3140-3153, 2016. Type: Article

Recommenders take data, analyze it, and on the basis of these results offer recommendations to end users about the decisions to make: which restaurant would be the most appropriate considering their preferences and location, what concert to attend...

May 9 2017
  The power of networks: six principles that connect our lives
Brinton C., Chiang M.,  Princeton University Press, Princeton, NJ, 2016. 328 pp. Type: Book (978-0-691170-71-8)

Christopher Brinton and Mung Chiang have taught an online course on networks to more than 100,000 students around the world using the Coursera platform since 2013 [1]. This course was based on a previous course taught by Mung Chiang at Princeton a...

May 8 2017
  Inferring directions of undirected social ties
Zhang J., Wang C., Wang J., Yu J., Chen J., Wang C.  IEEE Transactions on Knowledge and Data Engineering 28(12): 3276-3292, 2016. Type: Article

With the advent of social networks, there are many opportunities available for researchers to research and analyze social ties. This is especially true with social networking sites like LinkedIn. In this paper, the authors aim to analyze the direc...

Apr 26 2017
  Fraud analytics using descriptive, predictive, and social network techniques: a guide to data science for fraud detection
Baesens B., Van Vlasselaer V., Verbeke W.,  Wiley Publishing, Hoboken, NJ, 2015. 400 pp. Type: Book (978-1-119133-12-4)

The general scope of fraud analytics comprises a set of both conceptual approaches and appropriate tools for detecting certain anomalies in processes that can be associated with fraud. Fraud can occur in several business domains, spanning from ban...

Mar 15 2017
  Retrieving the maximal time-bounded positive influence set from social networks
Shi T., Cheng S., Cai Z., Li Y., Li J.  Personal and Ubiquitous Computing 20(5): 717-730, 2016. Type: Article

The spread of information about products, ideas, and behaviors, and their adoption, is an important tool in viral marketing and communication strategies in politics. Shi et al. assume that social networks play a unique role in this process, and th...

Nov 15 2016
  A trust evaluation scheme for complex links in a social network: a link strength perspective
Li M., Xiang Y., Zhang B., Huang Z., Zhang J.  Applied Intelligence 44(4): 969-987, 2016. Type: Article

As links among users are the channel for interchanging information inside social networks, trust is a widely accepted indicator or parameter to discover and analyze potential security threats. This work proposes a trust evaluation schema for socia...

Nov 10 2016
  Characteristics of social media stories
AlNoamany Y., Weigle M., Nelson M.  International Journal on Digital Libraries 17(3): 239-256, 2016. Type: Article

Through its portrayal of social media in an archival review, this paper attempts to decipher “what makes a story good.” In order to do this, the paper identifies popular “human-generated” posts. The concept that a timeline ...

Nov 9 2016
  Beyond smartphone overuse: identifying addictive mobile apps
Ding X., Xu J., Chen G., Xu C.  CHI EA 2016 (Proceedings of the 2016 CHI Conference Extended Abstracts, Santa Clara, CA,  May 7-12, 2016) 2821-2828, 2016. Type: Proceedings

More and more, research on Internet addiction applies not only to games or time spent on the network, but also to smartphone addiction. The main aim of the analysis reported in the paper is the relation between mobile apps and proneness to smartph...

Oct 6 2016
  Tweet properly: analyzing deleted tweets to understand and identify regrettable ones
Zhou L., Wang W., Chen K.  WWW 2016 (Proceedings of the 25th International World Wide Web Conference, Montréal, Québec, Canada,  Apr 11-15, 2016) 603-612, 2016. Type: Proceedings

Whoever thought that a 140-character method of social media communication would warrant so much academic attention? Its use in my classroom was brought about by a desire to have students at the leading edge of all types of information technology f...

Sep 8 2016
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy