The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As a result of the importance of academic collaboration at smart conferences, various researchers have utilized recommender systems to generate effective recommendations for participants. Recent research has shown that the personality traits of users can be used as innovative entities for effective recommendations. Nevertheless, subjective perceptions involving the personality of participants at smart...
The most significant trend in human creativity is the shift from individual to teams. Great achievements across academic disciplines and industries are increasingly teamwork. Motivated by this, we aim to uncover teamwork in networks, including predicting teams' performance, optimizing teams' compositions and explaining the prediction results and optimization actions.
Online data provide a way to monitor how users behave in social systems like social networks and online games, and understand which features turn an ordinary individual into a successful one. Here, we propose to study individual performance and success in Multiplayer Online Battle Arena (MOBA) games. Our purpose is to identify those behaviors and playing styles that are characteristic of players with...
Information networks such as social networks, publication networks, and the World Wide Web are ubiquitous in the real world. Traditionally, adjacency matrices are used to represent the networks. However, adjacency matrices are too sparse and too high dimensional when the scale of the networks is large. Network embedding, which aims to learn low-dimensional continuous representations for nodes, has...
Multilayer network analysis has become a vital tool for understanding different relationships and their interactions in a complex system, where each layer in a multilayer network depicts the topological structure of a group of nodes corresponding to a particular relationship. The interactions among different layers imply how the interplay of different relations on the topology of each layer. For a...
Social Media allows people to post widely and share the posted online-items. Such items gain their popularity by the amount of attention received. Thus, studies on modeling the arrival process of attention to an individual item have recently attracted a great deal of interest. In this paper, we propose, by combining a Dirichlet process with a Hawkes process in a novel way, a probabilistic model, called...
Undergraduates perform independent research or use research, regardless of their discipline. For most students, this work is part of a formalized experience. However, formalized training in research methods, biases, and disposition is rare; students acquire these skills through mentoring, modeling, and making mistakes, and in the context and content of the discipline. These methods are not ideal....
Data collection by social networking applications offers many opportunities for mining information, which provides a better understanding of social structures and their dynamic structures. Anonymization of social networks before they are published or shared is particularly important, since social network data usually contain much sensitive information on individuals. In this paper, we address the...
This research intends to analyze how users that are also HCI designers relate to the interaction with digital memorials linked to graves through QRcodes. To do so, we have carried out an immersive practice in the Consolação Cemetery (São Paulo, Brazil), where that technology is used to tag the graves of famous deceased people and to guide the visitors in the site. Those QR code tags link the graves...
Can machine learning prove useful in deciding sociological questions that are difficult for humans to judge impartially? We propose that it can, and even simple methods can be useful for evaluating evidence with reduced influence from human bias. Our case study is intelligent design (ID) social media, particularly the detection of religious content therein. Being a polarizing topic, critics of intelligent...
Fake news—false stories that mimic real research or journalism and spread quickly online—and our awareness of it has proliferated in the months leading up to and following the 2016 presidential election. This workshop will help instructors of technical and professional writing define fake news for their students, identify the ways social media lends ethos to fake news, and give students a consistent...
Most of the existing community detection (CD) methods are designed primarily for unsigned networks containing only positive links. Therefore, it is significant to explore and design effective CD methods for signed social networks (SNs) with both positive and negative links. In this paper, we first utilize decomposable characteristic of modularity Q to establish a bi-objective model for community detection...
Traditional approaches to analysis the sentiment of short text don't consider the relationship between emotion words and modifiers and simply accumulate the sentiment of the sentence to obtain the sentiment of short text. In this paper, we show how to mitigate the problems through sentiment structure and the sentiment calculation rules. The sentiment structure is obtained from the dependency parsing...
Degree distribution is an important characteristic of complex networks. To better understand the mechanism of complex networks, it is necessary to analyze their vertex-degree sequences. We had shown before that, for a complex network model with power law distribution or exponential distribution or general degree distribution, the length l of the unequal vertex-degree sequence is of order logN. Poisson...
A social health care system, and palliative care in particular, can be viewed as a social network of interacting patients and care providers. Each patient in the network has a set of capabilities to perform his or her intended daily tasks. However, some patients may not have the required capabilities to carry out their desired tasks. Consequently, different groups of care providers offer the patients...
On a crowdsourcing platform, in order to cheat for rewards or sabotage the crowdsourcing processes, spam workers submit numerous random and erroneous answers to the tasks published by honest requesters. This type of behaviours extremely reduces the enthusiasm of honest users, which may lead a crowdsourcing platform to a failure. To defend the threats from spam workers, reputation-based defense mechanisms...
Rumors spread on Online Social Networks sometimes can lead to serious social issues. To accurately identify them from normal posts is proved to be of great value. Users' behaviors are different when they post rumors and normal posts. Since rumors only account for a small percentage of all posts, they can be regarded as anomalies. Therefore, we propose an anomaly detection method based on autoencoder...
In this paper, we investigate a largely extended version of classical MAB problem, called networked combinatorial bandit problems. In particular, we consider the setting of a decision maker over a networked bandits as follows: each time a combinatorial strategy, e.g., a group of arms, ischosen, and the decision maker receives a rewardresulting from her strategy and also receives a side bonusresulting...
Nowadays, Online Social Networks (OSNs) has become one of the most common ways among people to facilitate communication. This has made it a target for attackers to steal information from influential users and has brought new forms of customized attacks for OSNs. Attackers take advantage of the user's trustworthiness when using OSN. This exploitation leads to attacks with a combination of both classical...
Online Social Networks (OSNs) have become a rewarding target for attackers. One particularly popular attack is the Sybil attack, in which the adversary creates many fake accounts called Sybils in order to, for instance, distribute spam or manipulate voting results. A first generation of defense systems tried to detect these Sybils by analyzing changes in the structure of the OSN graph---unfortunately...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.