Disinformation, Misinformation, and Fake News in Social Media [[electronic resource] ] : Emerging Research Challenges and Opportunities / / edited by Kai Shu, Suhang Wang, Dongwon Lee, Huan Liu |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource |
Disciplina | 070.43 |
Collana | Lecture Notes in Social Networks |
Soggetto topico |
Data mining
Social sciences—Data processing Social sciences—Computer programs Application software Social media Journalism Data Mining and Knowledge Discovery Computational Social Sciences Computer Appl. in Social and Behavioral Sciences Social Media |
ISBN | 3-030-42699-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Social Network Analysis and Cyber Forensics Informed Exploration of Disinformation Campaigns -- Mitigating Fake News through Fact-checking URL recommendation -- Detecting Fake News with Semi-supervised Tensor Decomposition -- Learning Hierarchical Discourse-level Structure for Fake News Detection -- Mining Styles and Emotions for Fake News Detection -- Fake News Detection with Deep Diffusive Network Model -- Fake News Detection: An Interdisciplinary Research -- Jointly Identifying Framing Bias and Detecting Fake News on Social Media. |
Record Nr. | UNISA-996465359703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Disinformation, Misinformation, and Fake News in Social Media : Emerging Research Challenges and Opportunities / / edited by Kai Shu, Suhang Wang, Dongwon Lee, Huan Liu |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource |
Disciplina |
070.43
302.231 |
Collana | Lecture Notes in Social Networks |
Soggetto topico |
Data mining
Social sciences—Data processing Social sciences—Computer programs Application software Social media Journalism Data Mining and Knowledge Discovery Computational Social Sciences Computer Appl. in Social and Behavioral Sciences Social Media |
ISBN | 3-030-42699-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Social Network Analysis and Cyber Forensics Informed Exploration of Disinformation Campaigns -- Mitigating Fake News through Fact-checking URL recommendation -- Detecting Fake News with Semi-supervised Tensor Decomposition -- Learning Hierarchical Discourse-level Structure for Fake News Detection -- Mining Styles and Emotions for Fake News Detection -- Fake News Detection with Deep Diffusive Network Model -- Fake News Detection: An Interdisciplinary Research -- Jointly Identifying Framing Bias and Detecting Fake News on Social Media. |
Record Nr. | UNINA-9910410033903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the Sixth ACM International Workshop on Web Information and Data Management: WIDM 2004: November 12-13, 2004, Washington, D.C., USA: Co-Located with CIKM 2004 |
Autore | Laender Alberto H. F |
Pubbl/distr/stampa | [Place of publication not identified], : ACM Press, 2004 |
Descrizione fisica | 1 online resource (168 p.;) |
Disciplina | 005.74 |
Collana | ACM Conferences |
Soggetto topico |
Engineering & Applied Sciences
Computer Science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | WIDM '04 |
Record Nr. | UNINA-9910375912903321 |
Laender Alberto H. F | ||
[Place of publication not identified], : ACM Press, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Social, Cultural, and Behavioral Modeling [[electronic resource] ] : 10th International Conference, SBP-BRiMS 2017, Washington, DC, USA, July 5-8, 2017, Proceedings / / edited by Dongwon Lee, Yu-Ru Lin, Nathaniel Osgood, Robert Thomson |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XVIII, 358 p. 98 illus.) |
Disciplina | 302.30285 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computers and civilization
Artificial intelligence Application software Data mining Computer communication systems Computers and Society Artificial Intelligence Computer Appl. in Social and Behavioral Sciences Information Systems Applications (incl. Internet) Data Mining and Knowledge Discovery Computer Communication Networks |
ISBN | 3-319-60240-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Behavioral and Social Sciences -- Inferring Follower Preferences in the 2016 U.S. Presidential Primaries with Sparse Learning -- 1 Introduction -- 2 Related Work -- 3 Data -- 4 Methodology -- 4.1 Model Formulation -- 4.2 Coordinate Descent Algorithm -- 4.3 Model Selection -- 5 Empirical Results -- 6 Conclusions -- References -- Detection and Analysis of 2016 US Presidential Election Related Rumors on Twitter -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 Rumor Detection -- 4.1 Rumor Detection Algorithms -- 4.2 Evaluation on Rumor Classification Task -- 4.3 Evaluation on Rumor Identification Task -- 5 Analyzing Rumor Tweets Pertaining to the Election -- 5.1 Which Side Posted the Most Rumors? -- 5.2 Who Posted These Rumors? -- 5.3 What Rumors Did They Post? -- 5.4 When Did They Post These Rumors? -- 6 Conclusions -- References -- How Emotional Support and Informational Support Relate to Linguistic Alignment -- 1 Introduction -- 2 Related Work -- 3 Automated Classification of Social Support Types -- 4 Linguistic Alignment Measures -- 5 Corpus -- 6 Alignment and Support Type at Post Level -- 6.1 Methods -- 6.2 Results -- 7 Discussion -- 8 Conclusion and Future Work -- References -- Gender Politics in the 2016 U.S. Presidential Election: A Computer Vision Approach -- 1 Introduction -- 2 Related Literature -- 3 Data and Methodology -- 3.1 Data -- 3.2 Modeling Gender Affinity -- 3.3 Statistical Testing -- 3.4 Gender Inference by Computer Vision -- 4 Case Study: The Woman Card -- 5 Limitations and Future Research -- 6 Conclusions -- References -- Agent-Based Modeling Approach in Understanding Behavior During Disasters: Measuring Response and Rescue in eBayanihan Disaster Management Platform -- 1 Introduction -- 2 Literature Review.
2.1 Agent-Based Modeling in Understanding Behaviors During Disaster and Emergency Events -- 2.2 Organizational Chart of the Philippine Rescue and Response Cluster -- 2.3 eBayanihan as a Social Networking Platform for Disaster Management -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- An Agent-Based Model of Posting Behavior During Times of Societal Unrest -- 1 Introduction -- 2 Data Collection -- 2.1 Preliminary Analysis -- 3 Model Description -- 4 Results and Discussion -- References -- 'They All Look the Same to Me.' An Agent Based Simulation of Out-Group Homogeneity -- Abstract -- 1 Background -- 2 Model Description -- 2.1 Model Scope and Architecture -- 3 Experimental Runs -- 3.1 A World Without Out-Group Homogeneity -- 3.2 Introducing Out-Group Homogeneity -- 4 Discussion and Conclusion -- References -- Cultural Dimension Theory Based Simulations for US Army Personnel -- 1 Introduction -- 2 Literature Review -- 2.1 Cultural Dimensions -- 2.2 Virtual Reality C3 Simulations -- 3 Cultural Dimension Theory Applicability -- 3.1 Objective -- 3.2 Method -- 3.3 Results -- 3.4 Discussion -- 4 Cultural Simulation Design Process -- 4.1 Overview -- 4.2 Simulation Development -- 5 Conclusion -- References -- Socio-Cultural Cognitive Mapping -- Abstract -- 1 Introduction -- 2 Algorithm -- 2.1 Selecting Data -- 2.2 Generating the Similarity and Constraint Matrices -- 2.3 Moving Nodes to Satisfice Constraints -- 2.4 Evaluating Fit and Returning Results -- 3 The Hatfield-McCoy Case Study -- 4 Discussion and Conclusion -- References -- Cyber and Intelligence Applications -- A Cognitive Model of Feature Selection and Categorization for Autonomous Systems -- Abstract -- 1 Introduction -- 2 Approach -- 2.1 A Cognitive Theory of Categorization -- 2.2 ACT-R Implementation -- 3 Testing and Revision -- 3.1 Testing Procedure. 3.2 Results and Incremental Refinement -- 4 Conclusions and Future Directions -- Acknowledgements -- References -- ENWalk: Learning Network Features for Spam Detection in Twitter -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 Spam Analysis -- 4.1 Spammer Type -- 4.2 Activity Window -- 4.3 Fraudulence -- 4.4 Mentioning Celebrities and Popular Hashtags -- 5 Learning Latent Features for Spam Detection -- 5.1 Overview -- 5.2 The Optimization Problem -- 5.3 Equivalent Neighborhood Generation -- 5.4 Algorithm: ENWalk -- 6 Experiment -- 6.1 Baseline Methods -- 6.2 Node Classification -- 6.3 Node Ranking -- 7 Conclusion -- Acknowledgements -- References -- Understanding Russian Information Operations Using Unsupervised Multilingual Topic Modeling -- Abstract -- 1 Introduction -- 2 STEMMER: A Framework for Unsupervised Analytics -- 3 Results -- 3.1 'Brilliant Jump' NATO Exercises Dataset -- 3.2 2016 Presidential Election Dataset - Results of Interest -- 4 Conclusion -- References -- Social Cyber Forensics Approach to Study Twitter's and Blogs' Influence on Propaganda Campaigns -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Conclusion, Summary, and Future Directions -- Acknowledgements -- References -- From Cyber Space Opinion Leaders and the Diffusion of Anti-vaccine Extremism to Physical Space Disea ... -- Abstract -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Agents and Environment -- 3.2 Process Overview and Model Scheduling -- 3.3 Initialization -- 4 Results -- 5 Discussion -- References -- Event-Based Model Simulating the Change in DDoS Attack Trends After P/DIME Events -- 1 Introduction -- 2 Relevant Work -- 3 Method -- 4 Virtual Experiment -- 5 Results and Discussion -- 5.1 Overview -- 5.2 Limitations -- 6 Conclusion -- References. Using a Real-Time Cybersecurity Exercise Case Study to Understand Temporal Characteristics of Cyberattacks -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 Observed Duration of Adversarial Intrusion Chain Stages -- 3.2 Time Series Generation and Clustering -- 3.3 Analysis of the Adaptation Process -- 4 Conclusion -- References -- Hybrid Modeling of Cyber Adversary Behavior -- Abstract -- 1 Introduction -- 2 Hybrid Cyber Adversary Models -- 2.1 Decision Theoretic Models -- 2.2 Cognitive Decision-Making Models -- 2.3 Grammatical Representation of Cyber Attack Vectors -- 2.4 Reactive Agent Framework for Realistic Goal Prioritization -- 3 Discussion and Conclusions -- Acknowledgements -- References -- Cyber-FIT: An Agent-Based Modelling Approach to Simulating Cyber Warfare -- Abstract -- 1 Introduction -- 2 Background -- 3 The Cyber-FIT Simulation Framework -- 3.1 Model Definition -- 3.2 Terrain -- 3.3 Forces -- 3.4 Interactions -- 3.5 Model Outputs -- 4 Virtual Experiments -- 4.1 How Many Forces Should We Deploy to Minimize the Effect of a Routing Protocol Attack (RPA) in an ... -- 4.2 What Will Be the Expected Effect on Cyber Terrain if the Adversary Switches from a Fifteen Day R ... -- 4.3 What Number of Forces Maximizes Expected Cyber Terrain Mission Capability Rate Against Random At ... -- 5 Discussion -- 6 Conclusion -- References -- Information, Systems, and Network Sciences -- Large-Scale Sleep Condition Analysis Using Selfies from Social Media -- Abstract -- 1 Introduction -- 2 Model Construction -- 2.1 Training Data Collection and Rating -- 2.2 Feature Extraction for Facial Images -- 2.3 Model Training and Prediction -- 3 Selfie Collection, Processing and Prediction -- 4 Main Result -- 4.1 Age, Gender, and Race -- 5 Related Work -- 6 Limitations and Future Work -- 7 Conclusions -- Acknowledgement -- References. Modeling the Co-evolution of Culture, Signs and Network Structure -- 1 Introduction -- 2 Methodology -- 3 Results -- 4 Discussion -- References -- Simulating Population Behavior: Transportation Mode, Green Technology, and Climate Change -- Abstract -- 1 Introduction -- 2 Theoretical Background -- 2.1 The Agent Based Model -- 3 ABM Model Experiments -- 3.1 Transportation Behavior Model -- 3.2 Results Analysis and Discussion -- 4 Conclusion -- Acknowledgements -- References -- A Parametric Study of Opinion Progression in a Divided Society -- 1 Introduction -- 2 Simulation Setup -- 2.1 Probabilistic Finite State Automata -- 2.2 Bounded Confidence Dynamic -- 3 Simulation Scenarios and Results -- 3.1 Effect of Global Events -- 3.2 Effect of Influencers -- 3.3 Effect of Distance Parameter (d) -- 4 Conclusion and Future Work -- References -- Integrating Simulation and Signal Processing with Stochastic Social Kinetic Model -- 1 Introduction -- 2 Stochastic Social Kinetic Model -- 3 Particle Filter with Stochastic Kinetic Model -- 4 Tracking City-Scale Transportation Dynamics -- 4.1 Modeling Traffic Dynamics -- 4.2 Experimental Setup -- 4.3 Evaluation Results -- 5 Conclusions -- References -- Learning Network Dynamics from Tumblr®: A Search for Influential Users -- 1 Introduction -- 2 Transforming Network Attributes -- 2.1 Signal Processing on Graphs -- 2.2 The Dictionary Learning Approach -- 2.3 Dictionary Learning Adaptations for Improved Parallelism -- 3 Opinion Dynamics Simulations -- 3.1 The Decaying Cascade Model -- 3.2 The Threshold Model -- 4 Simulation Analysis -- 5 Real Data Results -- 6 Conclusion -- References -- Modeling the Impact of Protraction on Refugee Identity -- Abstract -- 1 Introduction -- 2 Protraction and Refugee-Based Identity -- 3 Modeling Approach -- 4 Model Development -- 5 Simulation Results -- 6 Conclusions -- Acknowledgements. References. |
Record Nr. | UNISA-996466286503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Social, Cultural, and Behavioral Modeling : 10th International Conference, SBP-BRiMS 2017, Washington, DC, USA, July 5-8, 2017, Proceedings / / edited by Dongwon Lee, Yu-Ru Lin, Nathaniel Osgood, Robert Thomson |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XVIII, 358 p. 98 illus.) |
Disciplina | 302.30285 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computers and civilization
Artificial intelligence Application software Data mining Computer communication systems Computers and Society Artificial Intelligence Computer Appl. in Social and Behavioral Sciences Information Systems Applications (incl. Internet) Data Mining and Knowledge Discovery Computer Communication Networks |
ISBN | 3-319-60240-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Behavioral and Social Sciences -- Inferring Follower Preferences in the 2016 U.S. Presidential Primaries with Sparse Learning -- 1 Introduction -- 2 Related Work -- 3 Data -- 4 Methodology -- 4.1 Model Formulation -- 4.2 Coordinate Descent Algorithm -- 4.3 Model Selection -- 5 Empirical Results -- 6 Conclusions -- References -- Detection and Analysis of 2016 US Presidential Election Related Rumors on Twitter -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 Rumor Detection -- 4.1 Rumor Detection Algorithms -- 4.2 Evaluation on Rumor Classification Task -- 4.3 Evaluation on Rumor Identification Task -- 5 Analyzing Rumor Tweets Pertaining to the Election -- 5.1 Which Side Posted the Most Rumors? -- 5.2 Who Posted These Rumors? -- 5.3 What Rumors Did They Post? -- 5.4 When Did They Post These Rumors? -- 6 Conclusions -- References -- How Emotional Support and Informational Support Relate to Linguistic Alignment -- 1 Introduction -- 2 Related Work -- 3 Automated Classification of Social Support Types -- 4 Linguistic Alignment Measures -- 5 Corpus -- 6 Alignment and Support Type at Post Level -- 6.1 Methods -- 6.2 Results -- 7 Discussion -- 8 Conclusion and Future Work -- References -- Gender Politics in the 2016 U.S. Presidential Election: A Computer Vision Approach -- 1 Introduction -- 2 Related Literature -- 3 Data and Methodology -- 3.1 Data -- 3.2 Modeling Gender Affinity -- 3.3 Statistical Testing -- 3.4 Gender Inference by Computer Vision -- 4 Case Study: The Woman Card -- 5 Limitations and Future Research -- 6 Conclusions -- References -- Agent-Based Modeling Approach in Understanding Behavior During Disasters: Measuring Response and Rescue in eBayanihan Disaster Management Platform -- 1 Introduction -- 2 Literature Review.
2.1 Agent-Based Modeling in Understanding Behaviors During Disaster and Emergency Events -- 2.2 Organizational Chart of the Philippine Rescue and Response Cluster -- 2.3 eBayanihan as a Social Networking Platform for Disaster Management -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- An Agent-Based Model of Posting Behavior During Times of Societal Unrest -- 1 Introduction -- 2 Data Collection -- 2.1 Preliminary Analysis -- 3 Model Description -- 4 Results and Discussion -- References -- 'They All Look the Same to Me.' An Agent Based Simulation of Out-Group Homogeneity -- Abstract -- 1 Background -- 2 Model Description -- 2.1 Model Scope and Architecture -- 3 Experimental Runs -- 3.1 A World Without Out-Group Homogeneity -- 3.2 Introducing Out-Group Homogeneity -- 4 Discussion and Conclusion -- References -- Cultural Dimension Theory Based Simulations for US Army Personnel -- 1 Introduction -- 2 Literature Review -- 2.1 Cultural Dimensions -- 2.2 Virtual Reality C3 Simulations -- 3 Cultural Dimension Theory Applicability -- 3.1 Objective -- 3.2 Method -- 3.3 Results -- 3.4 Discussion -- 4 Cultural Simulation Design Process -- 4.1 Overview -- 4.2 Simulation Development -- 5 Conclusion -- References -- Socio-Cultural Cognitive Mapping -- Abstract -- 1 Introduction -- 2 Algorithm -- 2.1 Selecting Data -- 2.2 Generating the Similarity and Constraint Matrices -- 2.3 Moving Nodes to Satisfice Constraints -- 2.4 Evaluating Fit and Returning Results -- 3 The Hatfield-McCoy Case Study -- 4 Discussion and Conclusion -- References -- Cyber and Intelligence Applications -- A Cognitive Model of Feature Selection and Categorization for Autonomous Systems -- Abstract -- 1 Introduction -- 2 Approach -- 2.1 A Cognitive Theory of Categorization -- 2.2 ACT-R Implementation -- 3 Testing and Revision -- 3.1 Testing Procedure. 3.2 Results and Incremental Refinement -- 4 Conclusions and Future Directions -- Acknowledgements -- References -- ENWalk: Learning Network Features for Spam Detection in Twitter -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 Spam Analysis -- 4.1 Spammer Type -- 4.2 Activity Window -- 4.3 Fraudulence -- 4.4 Mentioning Celebrities and Popular Hashtags -- 5 Learning Latent Features for Spam Detection -- 5.1 Overview -- 5.2 The Optimization Problem -- 5.3 Equivalent Neighborhood Generation -- 5.4 Algorithm: ENWalk -- 6 Experiment -- 6.1 Baseline Methods -- 6.2 Node Classification -- 6.3 Node Ranking -- 7 Conclusion -- Acknowledgements -- References -- Understanding Russian Information Operations Using Unsupervised Multilingual Topic Modeling -- Abstract -- 1 Introduction -- 2 STEMMER: A Framework for Unsupervised Analytics -- 3 Results -- 3.1 'Brilliant Jump' NATO Exercises Dataset -- 3.2 2016 Presidential Election Dataset - Results of Interest -- 4 Conclusion -- References -- Social Cyber Forensics Approach to Study Twitter's and Blogs' Influence on Propaganda Campaigns -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Conclusion, Summary, and Future Directions -- Acknowledgements -- References -- From Cyber Space Opinion Leaders and the Diffusion of Anti-vaccine Extremism to Physical Space Disea ... -- Abstract -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Agents and Environment -- 3.2 Process Overview and Model Scheduling -- 3.3 Initialization -- 4 Results -- 5 Discussion -- References -- Event-Based Model Simulating the Change in DDoS Attack Trends After P/DIME Events -- 1 Introduction -- 2 Relevant Work -- 3 Method -- 4 Virtual Experiment -- 5 Results and Discussion -- 5.1 Overview -- 5.2 Limitations -- 6 Conclusion -- References. Using a Real-Time Cybersecurity Exercise Case Study to Understand Temporal Characteristics of Cyberattacks -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 Observed Duration of Adversarial Intrusion Chain Stages -- 3.2 Time Series Generation and Clustering -- 3.3 Analysis of the Adaptation Process -- 4 Conclusion -- References -- Hybrid Modeling of Cyber Adversary Behavior -- Abstract -- 1 Introduction -- 2 Hybrid Cyber Adversary Models -- 2.1 Decision Theoretic Models -- 2.2 Cognitive Decision-Making Models -- 2.3 Grammatical Representation of Cyber Attack Vectors -- 2.4 Reactive Agent Framework for Realistic Goal Prioritization -- 3 Discussion and Conclusions -- Acknowledgements -- References -- Cyber-FIT: An Agent-Based Modelling Approach to Simulating Cyber Warfare -- Abstract -- 1 Introduction -- 2 Background -- 3 The Cyber-FIT Simulation Framework -- 3.1 Model Definition -- 3.2 Terrain -- 3.3 Forces -- 3.4 Interactions -- 3.5 Model Outputs -- 4 Virtual Experiments -- 4.1 How Many Forces Should We Deploy to Minimize the Effect of a Routing Protocol Attack (RPA) in an ... -- 4.2 What Will Be the Expected Effect on Cyber Terrain if the Adversary Switches from a Fifteen Day R ... -- 4.3 What Number of Forces Maximizes Expected Cyber Terrain Mission Capability Rate Against Random At ... -- 5 Discussion -- 6 Conclusion -- References -- Information, Systems, and Network Sciences -- Large-Scale Sleep Condition Analysis Using Selfies from Social Media -- Abstract -- 1 Introduction -- 2 Model Construction -- 2.1 Training Data Collection and Rating -- 2.2 Feature Extraction for Facial Images -- 2.3 Model Training and Prediction -- 3 Selfie Collection, Processing and Prediction -- 4 Main Result -- 4.1 Age, Gender, and Race -- 5 Related Work -- 6 Limitations and Future Work -- 7 Conclusions -- Acknowledgement -- References. Modeling the Co-evolution of Culture, Signs and Network Structure -- 1 Introduction -- 2 Methodology -- 3 Results -- 4 Discussion -- References -- Simulating Population Behavior: Transportation Mode, Green Technology, and Climate Change -- Abstract -- 1 Introduction -- 2 Theoretical Background -- 2.1 The Agent Based Model -- 3 ABM Model Experiments -- 3.1 Transportation Behavior Model -- 3.2 Results Analysis and Discussion -- 4 Conclusion -- Acknowledgements -- References -- A Parametric Study of Opinion Progression in a Divided Society -- 1 Introduction -- 2 Simulation Setup -- 2.1 Probabilistic Finite State Automata -- 2.2 Bounded Confidence Dynamic -- 3 Simulation Scenarios and Results -- 3.1 Effect of Global Events -- 3.2 Effect of Influencers -- 3.3 Effect of Distance Parameter (d) -- 4 Conclusion and Future Work -- References -- Integrating Simulation and Signal Processing with Stochastic Social Kinetic Model -- 1 Introduction -- 2 Stochastic Social Kinetic Model -- 3 Particle Filter with Stochastic Kinetic Model -- 4 Tracking City-Scale Transportation Dynamics -- 4.1 Modeling Traffic Dynamics -- 4.2 Experimental Setup -- 4.3 Evaluation Results -- 5 Conclusions -- References -- Learning Network Dynamics from Tumblr®: A Search for Influential Users -- 1 Introduction -- 2 Transforming Network Attributes -- 2.1 Signal Processing on Graphs -- 2.2 The Dictionary Learning Approach -- 2.3 Dictionary Learning Adaptations for Improved Parallelism -- 3 Opinion Dynamics Simulations -- 3.1 The Decaying Cascade Model -- 3.2 The Threshold Model -- 4 Simulation Analysis -- 5 Real Data Results -- 6 Conclusion -- References -- Modeling the Impact of Protraction on Refugee Identity -- Abstract -- 1 Introduction -- 2 Protraction and Refugee-Based Identity -- 3 Modeling Approach -- 4 Model Development -- 5 Simulation Results -- 6 Conclusions -- Acknowledgements. References. |
Record Nr. | UNINA-9910484737503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Social, Cultural, and Behavioral Modeling [[electronic resource] ] : 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28 - July 1, 2016, Proceedings / / edited by Kevin S. Xu, David Reitter, Dongwon Lee, Nathaniel Osgood |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XVIII, 412 p. 131 illus.) |
Disciplina | 006.7 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computers and civilization
Application software Management information systems Computer science Data mining Computer communication systems Computers and Society Computer Appl. in Social and Behavioral Sciences Management of Computing and Information Systems Data Mining and Knowledge Discovery Computer Communication Networks Information Systems Applications (incl. Internet) |
ISBN | 3-319-39931-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Deep understanding, socio-cognitive reasoning, and re-usable computational technology -- Computer science -- Psychology -- Sociology.-Communication science -- Public health -- Bioinformatics -- Political Science -- Organizational science. |
Record Nr. | UNISA-996465791703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Social, Cultural, and Behavioral Modeling : 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28 - July 1, 2016, Proceedings / / edited by Kevin S. Xu, David Reitter, Dongwon Lee, Nathaniel Osgood |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XVIII, 412 p. 131 illus.) |
Disciplina | 006.7 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computers and civilization
Application software Management information systems Computer science Data mining Computer communication systems Computers and Society Computer Appl. in Social and Behavioral Sciences Management of Computing and Information Systems Data Mining and Knowledge Discovery Computer Communication Networks Information Systems Applications (incl. Internet) |
ISBN | 3-319-39931-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Deep understanding, socio-cognitive reasoning, and re-usable computational technology -- Computer science -- Psychology -- Sociology.-Communication science -- Public health -- Bioinformatics -- Political Science -- Organizational science. |
Record Nr. | UNINA-9910481960403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
WIDM '05 : proceedings of the Seventh ACM International Workshop on Web Information and Data Management : November 5, 2005, Bremen, Germany : co-located with CIKM 2005 |
Pubbl/distr/stampa | [Place of publication not identified], : ACM Press, 2005 |
Descrizione fisica | 1 online resource (96 p.;) |
Disciplina | 005.74 |
Collana | ACM Conferences |
Soggetto topico |
Database management
World Wide Web Information retrieval Internet searching Engineering & Applied Sciences Computer Science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | WIDM '05 |
Record Nr. | UNINA-9910375921803321 |
[Place of publication not identified], : ACM Press, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|