-
1
-
-
77954811054
-
Measuring behavioral trust in social networks
-
S. Adall, R. Escriva, M. Goldberg, M. Hayvanovych, M. Magdon-Ismail, B. K. Szymanski, W. A. Wallace, and G. M. Williams. Measuring behavioral trust in social networks. In Proc. International Conference on Intelligence and Security Informatics (ISI), pages 150{152, 2010.
-
(2010)
Proc. International Conference on Intelligence and Security Informatics (ISI)
, pp. 150-152
-
-
Adall, S.1
Escriva, R.2
Goldberg, M.3
Hayvanovych, M.4
Magdon-Ismail, M.5
Szymanski, B.K.6
Wallace, W.A.7
Williams, G.M.8
-
5
-
-
84860848688
-
Detecting spammers on twitter
-
F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on twitter. In CEAS 2010 - Seventh annual Collaboration, Electronic messaging, Anti- Abuse and Spam Conference, 2010.
-
(2010)
CEAS 2010 - Seventh Annual Collaboration, Electronic Messaging, Anti- Abuse and Spam Conference
-
-
Benevenuto, F.1
Magno, G.2
Rodrigues, T.3
Almeida, V.4
-
6
-
-
77951739184
-
Tweet, tweet, retweet: Conversational aspects of retweeting on twitter
-
January 6
-
D. Boyd, S. Golder, and G. Lotan. Tweet, tweet, retweet: Conversational aspects of retweeting on twitter. In HICSS-43. IEEE: Kauai, HI, January 6., 2010.
-
(2010)
HICSS-43, IEEE: Kauai, HI
-
-
Boyd, D.1
Golder, S.2
Lotan, G.3
-
7
-
-
84856144678
-
Finding credible information sources in social networks based on content and social structure
-
K. Canini, B. Suh, and P. Pirolli. Finding credible information sources in social networks based on content and social structure. In 2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, 2011.
-
(2011)
Conference on Social Computing, In 2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International
-
-
Canini, K.1
Suh, B.2
Pirolli, P.3
-
9
-
-
41349117788
-
Finding community structure in very large networks
-
A. Clauset, M. Newman, and C. Moore. Finding community structure in very large networks. Phys. Rev. E, 70(6):066111, 2004.
-
(2004)
Phys. Rev. E
, vol.70
, Issue.6
, pp. 066111
-
-
Clauset, A.1
Newman, M.2
Moore, C.3
-
12
-
-
84856165157
-
Predicting personality from twitter
-
J. Golbeck, C. Robles, M. Edmondson, and K. Turner. Predicting personality from twitter. In 2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, 2011.
-
(2011)
2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing
-
-
Golbeck, J.1
Robles, C.2
Edmondson, M.3
Turner, K.4
-
13
-
-
79957964415
-
Predicting personality with social media
-
J. Golbeck, C. Robles, and K. Turner. Predicting personality with social media. In Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems, CHI EA 2011, pages 253{262, 2011.
-
(2011)
Proceedings of the 2011 Annual Conference Extended Abstracts on Human Factors in Computing Systems, CHI EA 2011
, pp. 253-262
-
-
Golbeck, J.1
Robles, C.2
Turner, K.3
-
15
-
-
84936824352
-
Economic action and social structure: The problem of embeddedness
-
M. Granovetter. Economic action and social structure: The problem of embeddedness. American Journal of Sociology, 91:481{510, 1985.
-
(1985)
American Journal of Sociology
, vol.91
, pp. 481-510
-
-
Granovetter, M.1
-
16
-
-
0004199349
-
The silent language
-
E. T. Hall. The Silent Language. Anchor, 1973.
-
(1973)
Anchor
-
-
Hall, E.T.1
-
19
-
-
43449135033
-
Why we twitter: Understanding microblogging usage and communities
-
A. Java, X. Song, T. Finin, and B. Tseng. Why we twitter: understanding microblogging usage and communities. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis, pages 56{65, 2007.
-
(2007)
Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis
, pp. 56-65
-
-
Java, A.1
Song, X.2
Finin, T.3
Tseng, B.4
-
20
-
-
70849124928
-
Surfing a web of trust: Reputation and reciprocity on couchsurfing
-
D. Lauterbach, H. Truong, T. Shah, and L. Adamic. Surfing a web of trust: Reputation and reciprocity on couchsurfing. In Proceedings of the 2009 International Conference on Computational Science and Engineering, volume 4, pages 346{353, 2009.
-
(2009)
Proceedings of the 2009 International Conference on Computational Science and Engineering
, vol.4
, pp. 346-353
-
-
Lauterbach, D.1
Truong, H.2
Shah, T.3
Adamic, L.4
-
21
-
-
0038752085
-
Mixing patterns in networks
-
M. E. J. Newman. Mixing patterns in networks. Physical Review E, 67, 2003.
-
(2003)
Physical Review E
, vol.67
-
-
Newman, M.E.J.1
-
24
-
-
77955627094
-
Dynamics of dyads in social networks: Assortative, relational, and proximity mechanisms
-
M. Rivera, S. Soderstrom, and B. Uzzi. Dynamics of dyads in social networks: Assortative, relational, and proximity mechanisms. Annual Review of Sociology, pages 91{115, 2010.
-
(2010)
Annual Review of Sociology
, pp. 91-115
-
-
Rivera, M.1
Soderstrom, S.2
Uzzi, B.3
-
25
-
-
79955105010
-
Synchronicity, instant messaging, and performance among financial traders
-
S. Saavedraa, K. Hagerty, and B. Uzzi. Synchronicity, instant messaging, and performance among financial traders. Proceeding of the National Academy of Sciences (PNAS), 2011.
-
(2011)
Proceeding of the National Academy of Sciences (PNAS)
-
-
Saavedraa, S.1
Hagerty, K.2
Uzzi, B.3
-
26
-
-
78649235583
-
Want to be retweeted? large scale analytics on factors impacting retweet in twitter network
-
B. Suh, L. Hong, P. Pirolli, and E. Chi. Want to be retweeted? large scale analytics on factors impacting retweet in twitter network. In 2010 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, 2010.
-
(2010)
2010 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing
-
-
Suh, B.1
Hong, L.2
Pirolli, P.3
Chi, E.4
-
27
-
-
77649253939
-
The psychological meaning of words: Liwc and computerized text analysis methods
-
Y. R. Tausczik and J. W. Pennebaker. The psychological meaning of words: Liwc and computerized text analysis methods. Journal of Language and Social Psychology, 29(1):24{54, 2010.
-
(2010)
Journal of Language and Social Psychology
, vol.29
, Issue.1
, pp. 24-54
-
-
Tausczik, Y.R.1
Pennebaker, J.W.2
-
28
-
-
0031094434
-
Social structure and competition in interfirm networks: The paradox of embeddedness
-
March
-
B. Uzzi. Social structure and competition in interfirm networks: The paradox of embeddedness. Administrative Science Quarterly, 42:35{67, March 1997.
-
(1997)
Administrative Science Quarterly
, vol.42
, pp. 35-67
-
-
Uzzi, B.1
-
30
-
-
84860857267
-
Weighted reciprocity in human communication networks
-
C. Wang, A. Strathman, O. Lizardo, D. Hachen, Z. Toroczkai, and N. V. Chawla. Weighted reciprocity in human communication networks. Social Networks (under review), 2011.
-
(2011)
Social Networks (Under Review)
-
-
Wang, C.1
Strathman, A.2
Lizardo, O.3
Hachen, D.4
Toroczkai, Z.5
Chawla, N.V.6
-
31
-
-
84860857266
-
Human communication dynamics: A study of the agreement between self-reported and email derived social networks
-
S. Wuchty and B. Uzzi. Human communication dynamics: A study of the agreement between self-reported and email derived social networks. PLoS One, forthcoming, 2011.
-
(2011)
PLoS One, Forthcoming
-
-
Wuchty, S.1
Uzzi, B.2
|