Interactive discovery of influential friends from social networks

被引:37
作者
Leung, Carson Kai-Sang [1 ]
Tanbeer, Syed K. [1 ]
Cameron, Juan J. [1 ]
机构
[1] Univ Manitoba, Dept Comp Sci, Winnipeg, MB R3T 2N2, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Applications on social networks; Computational aspects of social networks; Influential person; Knowledge discovery and data mining; Social network analysis and mining; Social network computing;
D O I
10.1007/s13278-014-0154-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social networks, which are made of social entities (e.g., individual users) linked by some specific types of interdependencies such as friendship, have become popular to facilitate collaboration and knowledge sharing among users. Such interactions or interdependencies can be dependent on or influenced by user characteristics such as connectivity, centrality, weight, importance, and activity in the networks. As such, some users in the social networks can be considered as highly influential to others. In this article, we propose a computational model that integrates data mining with social computing to help users discover influential friends from a specific portion of the social networks that they are interested in. Moreover, our social network analysis and mining model also allows users to interactively change their mining parameters (e.g., scopes of their interested portions of the social networks).
引用
收藏
页码:1 / 13
页数:13
相关论文
共 30 条
[1]  
Agrawal R., 1994, P 20 INT C VERY LARG, DOI DOI 10.1007/BF02948845
[2]   Finding and Matching Communities in Social Networks Using Data Mining [J].
Alsaleh, Slah ;
Nayak, Richi ;
Xu, Yue .
2011 INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2011), 2011, :389-393
[3]  
[Anonymous], 2012, 5 ACM INT C WEB SEAR
[4]  
Baatarjav E.-A, 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P242, DOI 10.1109/PASSAT/SocialCom.2011.103
[5]  
Barbosa EM, 2012, ACM SIGMOD 2012, P865
[6]  
Bhagat S, 2012, P 5 ACM INT C WEB SE, P603, DOI DOI 10.1145/2124295.2124368
[7]  
Cameron J. J., 2011, Proceedings of the 2011 IEEE 9th International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), P824, DOI 10.1109/DASC.2011.141
[8]   Virus Propagation Modeling in Facebook [J].
Fan, W. ;
Yeung, K. H. .
2010 INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2010), 2010, :331-335
[9]  
Ferreira LN, 2012, IJCNN 2012, DOI [10.1109/IJCNN.2012.6252477, DOI 10.1109/IJCNN.2012.6252477]
[10]  
Gorecki J., 2011, 2011 International Conference on Computational Aspects of Social Networks (CASoN 2011), P255, DOI 10.1109/CASON.2011.6085954