Editor's Note
Pages 1163 - 1164
Abstract
No abstract available.
References
[1]
C. L. Philip Chen and C. Zhang, “Data-Intensive Applications, Challenges, Techniques and Technologies: A Survey on Big Data,” Info. Sciences, vol. Volume 275, 2014, pp. 314–47.
[2]
A. Saulwick and K. Trentelman, “Towards a Formal Semantics of Social Influence,” Knowledge-Based Systems, vol. Volume 71, 2014, pp. 52–60.
[3]
M. Chen, S. Mao, and Y. Liu, “Big Data: A Survey,” Mobile Network Application, vol. Volume 19, no. Issue 2, 2014, pp. 171–209.
[4]
G. Wang, “Fine-Grained Feature-Based Social Influence Evaluation in Online Social Networks,” IEEE Trans. Parallel and Distrib. Sys., vol. Volume 25, no. Issue 9, 2014, pp. 2286–96.
[5]
D. Cercel and S. Trausan-Matu, “Opinion Propagation in Online Social Networks: A Survey,” in Proc. 4th ACM Int'l. Conf. Web Intelligence, Mining and Semantics, Thessaloniki, Greece. 2014.
[6]
S. Peng, “Containing Smartphone Worm Propagation with an Influence Maximization Algorithm,” Computer Networks, vol. Volume 74, 2014, pp. 103–13.
[7]
R. Tinati, “Big Data: Methodological Challenges and Approaches for Sociological Analysis,” Sociology, vol. Volume 48, no. Issue 1, 2014, pp. 23–39.
[8]
G. Song, “Influence Maximization on Large-Scale Mobile Social Network: A Divide-and-Conquer Method,” IEEE Trans. Parallel and Distrib. Sys., vol. Volume 26, no. Issue 5, 2015, pp. 1379–92.
[9]
S. Zhao and Ting Liu, “Causality and Its Applications in Social Media: A Survey,” J. Software, vol. Volume 25, no. Issue 12, 2014 (in Chinese), pp. 2733–52.
[10]
S. He, “Identifying Peer Influence in Online Social Networks Using Transfer Entropy,” in Proc. Pacific Asia Workshop Intelligence and Security Informatics, Beijing, China, 2013, pp. 47–61.
[11]
D. Kempe, J. Kleinberg, and E. Tardos, “Maximizing the Spread of Influence in a Social Network,” in Proc. 9th ACM SICKDD Int'l. Conf. Knowledge Discovery and Data Mining, Washington, 2003, pp. 137–46.
[12]
J. Sun, “Leverage RAF to Find Domain Experts on Research Social Networks Services: A Big Data Analytics Methodology with MapReduce Framework,” Int'l. J. Production Economics, vol. Volume 165, 2015, pp. 185–93.
[13]
Y. Zhou and L. Liu, “Social Influence Based Clustering of Heterogeneous Information Networks,” in Proc. 19th ACM SICKDD Int'l. Conf. Knowledge Discovery and Data Mining, 2013, Chicago, IL, pp. 338–46.
[14]
F. Bonchi, “Social Network Analysis and Mining for Business Applications,” ACM Trans. Intelligent Systems and Technology . vol. Volume 2, no. Issue 3, 2011, pp. 1–37.
- Editor's Note
Recommendations
Note-taker: enabling students who are legally blind to take notes in class
Assets '08: Proceedings of the 10th international ACM SIGACCESS conference on Computers and accessibilityThe act of note-taking is a key component of learning in secondary and post-secondary classrooms. Students who take notes retain information from classroom lectures better, even if they never refer to those notes afterward. However, students who are ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Copyright © 2017.
Publisher
IEEE Educational Activities Department
United States
Publication History
Published: 01 March 2017
Qualifiers
- Opinion
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 05 Jan 2025