Linked e-resources

Details

Intro
Contents
A Network-Based Approach to Understanding International Cooperation in Environmental Protection
1 Introduction
2 Concepts and Methodology
2.1 Network Data
2.2 Research Design and Methods
3 Research Findings
3.1 One-Mode Analysis of Environmental Agreements and Participating Parties
3.2 Two-Mode Analysis of Environmental Agreements and Participating Parties
4 Discussion and Future Work
References
Critical Mass and Data Integrity Diagnostics of a Twitter Social Contagion Monitor
1 Introduction
2 Background

2.1 Social Movements and Contagion Models
2.2 Social Movements and Social Media
2.3 Social Media Monitoring Tools
3 Methods and Data
3.1 IRB Compliance
3.2 Risks of Collecting Data on Social Movements
3.3 Data Ingestion
3.3.1 Streaming Contagion Monitor
3.3.2 Regional Contagion Monitor
3.3.3 Productionalized Streaming Contagion Monitor
3.4 Candidate Hashtag Selection
3.4.1 Streaming Contagion Monitor
3.4.2 Regional Contagion Monitor
3.4.3 Productionalized Contagion MonitorTM
3.5 Contagion Analysis
3.5.1 Streaming Contagion Monitor

3.5.2 Regional Contagion Monitor
3.5.3 Productionalized Contagion Monitor
3.6 Reporting
3.7 Coordination Framework
3.7.1 Introduction
3.7.2 Implementation: Data Ingestion
3.7.3 Implementation: Outputs
3.7.4 Integration
4 Results
4.1 Framework for Evaluating the Contagion Monitors
4.2 Evaluation of Complexity of Contagion (R1)
4.2.1 Mechanical Turk Annotation
4.2.2 Analysis of Annotated Hashtags
4.2.3 Spam Filtering
4.2.4 Linear Regression
4.2.5 Classification
4.3 Analysis of Critical Mass for Virality (R2)
4.4 Analysis of Data Size (R3)

4.5 A Fruitful Case Study
4.6 Results with Coordination Framework Metrics
5 Discussion and Conclusion
Appendix
References
TenFor: Tool to Mine Interesting Events from Security Forums Leveraging Tensor Decomposition
1 Introduction
2 Background and Datasets
2.1 Datasets
2.2 Background
3 Our Approach
3.1 Step 1: Tensor-Based Clustering
3.2 Step 2: Profiling the Clusters
3.3 Step 3: Investigation of Clusters
4 Results and Evaluation
4.1 Step by Step Output Provided by TenFor
4.2 Evaluation of TenFor with Real Data

4.3 Evaluation of TenFor with Synthetic Data
5 Discussion
6 Related Work
7 Conclusion
References
Profile Fusion in Social Networks: A Data-Driven Approach
1 Introduction
2 Related Works
3 ULSN System Architecture
3.1 Re-Usability, Code and Implementation Details
4 Data
4.1 Data Validation
4.2 Dataset Overview
4.3 Content Analysis
4.4 Temporal Analysis
5 User Profile Linkage
5.1 Problem Formulation
5.2 User Matching Approach
5.3 Classification Approach
5.4 Clustering-Based Optimization
6 Experiments
6.1 User Matching Results

Browse Subjects

Show more subjects...

Statistics

from
to
Export