default search action
IEEE Transactions on Computational Social Systems, Volume 5
Volume 5, Number 1, March 2018
- Fei-Yue Wang, Yong Yuan, Xiao Wang, Rui Qin:
Societies 5.0: A New Paradigm for Computational Social Systems Research. 2-8 - Poonam Yadav, Ioannis Charalampidis, Jeremy Cohen, John Darlington, François Grey:
A Collaborative Citizen Science Platform for Real-Time Volunteer Computing and Games. 9-19 - José Aguilar, Gerardo Garcia:
An Adaptive Intelligent Management System of Advertising for Social Networks: A Case Study of Facebook. 20-32 - Cheng-Te Li, Shou-De Lin:
Social Flocks: Simulating Crowds to Discover the Connection Between Spatial-Temporal Movements of People and Social Structure. 33-45 - Diego Perna, Roberto Interdonato, Andrea Tagarelli:
Identifying Users With Alternate Behaviors of Lurking and Active Participation in Multilayer Social Networks. 46-63 - Sarbani Roy, Paramita Dey, Debajyoti Kundu:
Social Network Analysis of Cricket Community Using a Composite Distributed Framework: From Implementation Viewpoint. 64-81 - Congyu Wu, Matthew S. Gerber:
Forecasting Civil Unrest Using Social Media and Protest Participation Theory. 82-94 - Yang Xing, Chen Lv, Zhaozhong Zhang, Huaji Wang, Xiaoxiang Na, Dongpu Cao, Efstathios Velenis, Fei-Yue Wang:
Identification and Analysis of Driver Postures for In-Vehicle Driving Activities and Secondary Tasks Recognition. 95-108 - Klimis S. Ntalianis, Anastasios D. Doulamis, Nicolas Tsapatsoulis, Nikos E. Mastorakis:
Social Relevance Feedback Based on Multimedia Content Power. 109-117 - Alun D. Preece, Irena Spasic, Kieran Evans, David Rogers, William M. Webberley, Colin Roberts, Martin Innes:
Sentinel: A Codesigned Platform for Semantic Enrichment of Social Media Streams. 118-131 - Yahui Wu, Su Deng, Hongbin Huang:
Control of Message Transmission in Delay/Disruption Tolerant Network. 132-143 - Khobaib Zaamout, Ken Barker:
Structure of Crowdsourcing Community Networks. 144-155 - Yung-Yin Lo, Wanjiun Liao, Cheng-Shang Chang, Ying-Chin Lee:
Temporal Matrix Factorization for Tracking Concept Drift in Individual User Preferences. 156-168 - Surendra Sedhai, Aixin Sun:
Semi-Supervised Spam Detection in Twitter Stream. 169-175 - Peijun Ye, Shuai Wang, Fei-Yue Wang:
A General Cognitive Architecture for Agent-Based Modeling in Artificial Societies. 176-185 - Eunice E. Santos, Eugene Santos, John Korah, Jeremy E. Thompson, Yan Zhao, Vairavan Murugappan, Jacob Russell:
Modeling Social Resilience in Communities. 186-199 - Yu Luo, Garud Iyengar, Venkat Venkatasubramanian:
Social Influence Makes Self-Interested Crowds Smarter: An Optimal Control Perspective. 200-209 - Rong-Kuan Shen, Yi-Nan Lin, Tong-Ying Tony Juang, Victor R. L. Shen, Soo Yong Lim:
Automatic Detection of Video Shot Boundary in Social Media Using a Hybrid Approach of HLFPN and Keypoint Matching. 210-219 - Alex Cassidy, Eric Cawi, Arye Nehorai:
A Model for Decision Making Under the Influence of an Artificial Social Network. 220-228 - Stavros Souravlas, Angelo Sifaleras:
Efficient Community-Based Data Distribution Over Multicast Trees. 229-243 - Shuai Wang, Xiao Wang, Peijun Ye, Yong Yuan, Shuo Liu, Fei-Yue Wang:
Parallel Crime Scene Analysis Based on ACP Approach. 244-255 - Eleni Stai, Eirini Milaiou, Vasileios Karyotis, Symeon Papavassiliou:
Temporal Dynamics of Information Diffusion in Twitter: Modeling and Experimentation. 256-264 - Rongsheng Dong, Libing Li, Qingpeng Zhang, Guoyong Cai:
Information Diffusion on Social Media During Natural Disasters. 265-276 - Ashutosh Trivedi, Shrisha Rao:
Agent-Based Modeling of Emergency Evacuations Considering Human Panic Behavior. 277-288 - Wayes Tushar, Chau Yuen, Wen-Tai Li, David B. Smith, Tapan Kumar Saha, Kristin L. Wood:
Motivational Psychology Driven AC Management Scheme: A Responsive Design Approach. 289-301
Volume 5, Number 2, June 2018
- Fei-Yue Wang, Yong Yuan, Chunming Rong, Jun Jason Zhang:
Parallel Blockchain: An Architecture for CPSS-Based Smart Societies. 303-310 - Cong Yang, Olaf Flak, Marcin Grzegorzek:
Representation and Matching of Team Managers: An Experimental Research. 311-323 - Ji Li, Zhipeng Cai, Jinbao Wang, Meng Han, Yingshu Li:
Truthful Incentive Mechanisms for Geographical Position Conflicting Mobile Crowdsensing Systems. 324-334 - Alireza Louni, K. P. Subbalakshmi:
Who Spread That Rumor: Finding the Source of Information in Large Online Social Networks With Probabilistically Varying Internode Relationship Strengths. 335-343 - Yishi Lin, Wei Chen, John C. S. Lui:
Boosting Information Spread: An Algorithmic Approach. 344-357 - Stephen L. France, Mahyar Sharif Vaghefi, William H. Batchelder:
FlexCCT: A Methodological Framework and Software for Ratings Analysis and Wisdom of the Crowd Applications. 358-370 - Samya Muhuri, Susanta Chakraborty, Sabitri Nanda Chakraborty:
Extracting Social Network and Character Categorization From Bengali Literature. 371-381 - Eugenius Kaszkurewicz, Amit Bhaya:
Modeling Market Share Dynamics Under Advertising Effort and Word-of-Mouth Interactions Between Customers. 382-390 - Pei-Yuan Zhou, Keith C. C. Chan, Carol Xiaojuan Ou:
Corporate Communication Network and Stock Price Movements: Insights From Data Mining. 391-402 - Koustav Rudra, Ashish Sharma, Niloy Ganguly, Saptarshi Ghosh:
Characterizing and Countering Communal Microblogs During Disaster Events. 403-417 - Alan Kuhnle, Md Abdul Alim, Xiang Li, Huiling Zhang, My T. Thai:
Multiplex Influence Maximization in Online Social Networks With Heterogeneous Diffusion Models. 418-429 - Yunpeng Xiao, Xixi Li, Haohan Wang, Ming Xu, Yanbing Liu:
3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in Social Networks. 430-443 - Yulia Tyshchuk, William A. Wallace:
Modeling Human Behavior on Social Media in Response to Significant Events. 444-457 - Ghita Mezzour, William Frankenstein, Kathleen M. Carley, L. Richard Carley:
A Socio-Computational Approach to Predicting Bioweapon Proliferation. 458-467 - Guangmo Tong, Weili Wu, Ding-Zhu Du:
Distributed Rumor Blocking With Multiple Positive Cascades. 468-480 - Xiaokang Wang, Wei Wang, Laurence T. Yang, Siwei Liao, Dexiang Yin, M. Jamal Deen:
A Distributed HOSVD Method With Its Incremental Computation for Big Data in Cyber-Physical-Social Systems. 481-492 - Kamal Taha:
Disjoint Community Detection in Networks Based on the Relative Association of Members. 493-507 - Qi Xuan, Mingming Zhou, Zhiyuan Zhang, Chenbo Fu, Yun Xiang, Zhefu Wu, Vladimir Filkov:
Modern Food Foraging Patterns: Geography and Cuisine Choices of Restaurant Patrons on Yelp. 508-517 - Jin-Hee Cho:
Dynamics of Uncertain and Conflicting Opinions in Social Networks. 518-531 - Kashif Zia, Dinesh Kumar Saini, Arshad Muhammad, Alois Ferscha:
Nature-Inspired Computational Model of Population Desegregation Under Group Leaders Influence. 532-543 - Yuling Hu, Xiao Wang, Fei-Yue Wang:
A Quantitative Study of Factors Influence on Evacuation in Building Fire Emergencies. 544-552 - Ge Guo, Dandan Li:
PMP-Based Set-Point Optimization and Sliding-Mode Control of Vehicular Platoons. 553-562 - Noha Alduaiji, Amitava Datta, Jianxin Li:
Influence Propagation Model for Clique-Based Community Detection in Social Networks. 563-575 - Li Li, Shuofeng Wang, Fei-Yue Wang:
An Analysis of Taxi Driver's Route Choice Behavior Using the Trace Records. 576-582 - Juanjuan Li, Xiaochun Ni, Yong Yuan:
The Reserve Price of Ad Impressions in Multi-Channel Real-Time Bidding Markets. 583-592
Volume 5, Number 3, September 2018
- Fei-Yue Wang, Yong Yuan, Juanjuan Li, Dongpu Cao, Lingxi Li, Petros A. Ioannou, Miguel Ángel Sotelo:
From Intelligent Vehicles to Smart Societies: A Parallel Driving Approach. 594-604 - Yalin E. Sagduyu, Alexander Grushin, Yi Shi:
Synthetic Social Media Data Generation. 605-620 - Dmitri Goldenberg, Alon Sela, Erez Shmueli:
Timing Matters: Influence Maximization in Social Networks Through Scheduled Seeding. 621-638 - Vasanthan Raghavan, Alexander G. Tartakovsky:
Tracking Changes in Resilience and Level of Coordination in Terrorist Networks. 639-659 - Pratik Chattopadhyay, Lipo Wang, Yap-Peng Tan:
Scenario-Based Insider Threat Detection From Cyber Activities. 660-675 - Lixing Wang:
Design Optimization of Food Safety Monitoring System With Social Network Analysis. 676-686 - Juanjuan Li, Shuai Wang, Yong Yuan, Xiaochun Ni, Fei-Yue Wang:
Dynamic Optimization of Employees Work Strategies in a WeChat-Based Evaluation System. 687-697 - Zehong Hu, Jie Zhang:
Toward General Robustness Evaluation of Incentive Mechanism Against Bounded Rationality. 698-712 - Bay-Yuan Hsu, Yi-Feng Lan, Chih-Ya Shen:
On Automatic Formation of Effective Therapy Groups in Social Networks. 713-726 - Seyyed Hadi Sajadi, MohammadAmin Fazli, Jafar Habibi:
The Affective Evolution of Social Norms in Social Networks. 727-735 - Wei Wei, Shuai Liu, Wenjia Li, Ding-Zhu Du:
Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes. 736-747 - Rui Qin, Yong Yuan, Fei-Yue Wang:
Research on the Selection Strategies of Blockchain Mining Pools. 748-757 - Xiao Xue, Giagia Gao, Shufang Wang, Zhiyong Feng:
Service Bridge: Transboundary Impact Evaluation Method of Internet. 758-772 - Youyang Qu, Shui Yu, Longxiang Gao, Wanlei Zhou, Sancheng Peng:
A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks. 773-784 - Honghao Gao, Shunyi Mao, Wanqiu Huang, Xiaoxian Yang:
Applying Probabilistic Model Checking to Financial Production Risk Evaluation and Control: A Case Study of Alibaba's Yu'e Bao. 785-795 - Lutao Zheng, Guanjun Liu, Chungang Yan, Changjun Jiang:
Transaction Fraud Detection Based on Total Order Relation and Behavior Diversity. 796-806 - Qingpeng Zhang, Dominic DiFranzo, Marie Joan Kristine Gloria, Bassem Makni, James A. Hendler:
Analyzing the Flow of Trust in the Virtual World With Semantic Web Technologies. 807-815 - Suman Kalyan Maity, Aman Kharb, Animesh Mukherjee:
Analyzing the Linguistic Structure of Question Texts to Characterize Answerability in Quora. 816-828 - Jun Jason Zhang, Fei-Yue Wang, Xiao Wang, Gang Xiong, Fenghua Zhu, Yisheng Lv, Jiachen Hou, Shuangshuang Han, Yong Yuan, Qingchun Lu, Yishi Lee:
Cyber-Physical-Social Systems: The State of the Art and Perspectives. 829-840 - Suman Kundu, Sankar K. Pal:
Double Bounded Rough Set, Tension Measure, and Social Link Prediction. 841-853 - Feng Wang, Li Xu, Wei Gao:
Comments on "SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors". 854-857 - Xiaoyan Lu, Boleslaw K. Szymanski:
Scalable Prediction of Global Online Media News Virality. 858-870 - Chengwen Luo, Chaoxi Li, Hande Hong, Jianqiang Li, Wei Li, Zhong Ming, Albert Y. Zomaya:
SODAR: Nonobtrusive Off-Line Social Structure Reconstruction Through Passive Wireless Sensing. 871-883 - Jonathan Ozik, Nicholson T. Collier, Justin M. Wozniak, Charles M. Macal, Gary An:
Extreme-Scale Dynamic Exploration of a Distributed Agent-Based Model With the EMEWS Framework. 884-895
Volume 5, Number 4, December 2018
- Fei-Yue Wang, Yong Yuan, Jun Zhang, Rui Qin, Michael H. Smith:
Blockchainized Internet of Minds: A New Opportunity for Cyber-Physical-Social Systems. 897-906 - Palash Goyal, Homa Hosseinmardi, Emilio Ferrara, Aram Galstyan:
Capturing Edge Attributes via Network Embedding. 907-917 - Xiaonan Wang, Yanli Li, Xingwei Wang:
Location-Related Content Communications With Mobility Support in Vehicular Scenarios. 918-930 - Zhiyi Lu, Victor O. K. Li, Qiqi Shuai:
Price Competition of Spreaders in Profit-Maximizing Sponsored Viral Marketing. 931-941 - Shuai Wang, Jing Wang, Xiao Wang, Tianyu Qiu, Yong Yuan, Liwei Ouyang, Yuanyuan Guo, Fei-Yue Wang:
Blockchain-Powered Parallel Healthcare Systems Based on the ACP Approach. 942-950 - Paul Wagenseller III, Feng Wang, Weili Wu:
Size Matters: A Comparative Analysis of Community Detection Algorithms. 951-960 - Shu-Sen Zhang, Xun Liang, Xuan Zhang, Rui Xu:
On Identification of Organizational and Individual Users Based on Social Content Measurements. 961-972 - Sreekanth Madisetty, Maunendra Sankar Desarkar:
A Neural Network-Based Ensemble Approach for Spam Detection in Twitter. 973-984 - Yuke Li, Jian Yang, Xiao Wang, Shuangshuang Han, Dongpu Cao, Fei-Yue Wang:
A CPSS-Based Network Resource Optimization Mechanism for Wireless Heterogeneous Networks. 985-994 - Noel Sardana, Robin Cohen, Jie Zhang, Shuo Chen:
A Bayesian Multiagent Trust Model for Social Networks. 995-1008 - Tianchong Gao, Feng Li, Yu Chen, Xukai Zou:
Local Differential Privately Anonymizing Online Social Networks Under HRG-Based Model. 1009-1020 - Kamal Berahmand, Asgarali Bouyer, Mahdi Vasighi:
Community Detection in Complex Networks by Detecting and Expanding Core Nodes Through Extended Local Similarity of Nodes. 1021-1033 - Min Zhou, Hairong Dong, Bin Ning, Fei-Yue Wang:
Recent Development in Pedestrian and Evacuation Dynamics: Bibliographic Analyses, Collaboration Patterns, and Future Directions. 1034-1048 - Christopher C. Yang, Ling Jiang:
Enriching User Experience in Online Health Communities Through Thread Recommendations and Heterogeneous Information Network Mining. 1049-1060 - Keng-Pei Lin, Yi-Wei Chang, Chih-Ya Shen, Mei-Chu Lin:
Leveraging Online Word of Mouth for Personalized App Recommendation. 1061-1070 - Maria Glenski, Tim Weninger, Svitlana Volkova:
Propagation From Deceptive News Sources Who Shares, How Much, How Evenly, and How Quickly? 1071-1082 - Ankan Mullick, Pawan Goyal, Niloy Ganguly, Manish Gupta:
Harnessing Twitter for Answering Opinion List Queries. 1083-1095 - Eric Lancaster, Tanmoy Chakraborty, V. S. Subrahmanian:
MALTP: Parallel Prediction of Malicious Tweets. 1096-1108 - Rogério Luís Rizzi, Wesley L. Kaizer, Claudia Brandelero Rizzi, Guilherme Galante, Flávio Codeço Coelho:
Modeling Direct Transmission Diseases Using Parallel Bitstring Agent-Based Models. 1109-1120 - Tianlong Gu, Minfeng Zhu, Wei Chen, Zhaosong Huang, Ross Maciejewski, Liang Chang:
Structuring Mobility Transition With an Adaptive Graph Representation. 1121-1132 - Shancang Li, Shanshan Zhao, Yong Yuan, Qindong Sun, Kewang Zhang:
Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems. 1133-1141 - Lifei Lu, Lida Xu, Boyi Xu, Guoqiang Li, Hongming Cai:
Fog Computing Approach for Music Cognition System Based on Machine Learning Algorithm. 1142-1151 - Nan Niu, Wentao Wang, Arushi Gupta, Mona Assarandarban, Li Da Xu, Juha Savolainen, Jing-Ru C. Cheng:
Requirements Socio-Technical Graphs for Managing Practitioners' Traceability Questions. 1152-1162 - Hao Jiang, Zhiyi Hu, Xianlong Zhao, Lintao Yang, Zhian Yang:
Exploring the Users' Preference Pattern of Application Services Between Different Mobile Phone Brands. 1163-1173 - Bo Zhou, Curtis L. Maines, Stephen Tang, Qi Shi, Po Yang, Qiang Yang, Jun Qi:
A 3-D Security Modeling Platform for Social IoT Environments. 1174-1188
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.