Predicting the content dissemination trends by repost behavior modeling in mobile social networks

Journal of Network and Computer Applications - Tập 42 - Trang 197-207 - 2014
Xinjiang Lu1, Zhiwen Yu1, Bin Guo1, Xingshe Zhou1
1School of Computer Science, Northwestern Polytechnical University, Xi’an, China

Tài liệu tham khảo

Adar Eytan, Adamic Lada A. Tracking information epidemics in blogspace. Web intelligence. In: Proceedings of the 2005 IEEE/WIC/ACM international conference on IEEE; 2005. Ashton, 2009, That ‘Internet of Things’ thing, RFiD J, 22, 97 Atzori, 2011, Siot: giving a social structure to the internet of things, IEEE Commun Lett, 15, 1193, 10.1109/LCOMM.2011.090911.111340 Atzori, 2012, The social Internet of Things (SIoT) – when social networks meet the Internet of Things: concept, architecture and network characterization, Comput Netw, 56, 3594, 10.1016/j.comnet.2012.07.010 Bakshy Eytan, Karrer Brian, Adamic Lada A. Social influence and the diffusion of user-created content. In: Proceedings of the 10th ACM conference on electronic commerce. ACM; 2009. Bakshy Eytan, Hofman Jake M., Mason Winter A., Watts Duncan J. Everyone׳s an influencer: quantifying influence on twitter. In: Proceedings of the fourth ACM international conference on Web search and data mining. ACM; 2011. Barabasi, 2005, The origin of bursts and heavy tails in human dynamics, Nature, 435, 207, 10.1038/nature03459 Boyd Danah, Golder Scott, Lotan Gilad. Tweet, tweet, retweet: conversational aspects of retweeting on twitter. In: Proceedings of the IEEE 43rd Hawaii International Conference on System Sciences (HICSS); 2010. Cheung, 2007 Clauset, 2009, Power-law distributions in empirical data, SIAM Rev, 51, 661, 10.1137/070710111 Costa, 2008, Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks, IEEE J Sel Areas Commun, 26, 748, 10.1109/JSAC.2008.080602 Edwards, 2007, Revisiting Lévy flight search patterns of wandering albatrosses, bumblebees and deer, Nature, 449, 1044, 10.1038/nature06199 Fast Andrew, Jensen David, Neil Levine Brian. Creating social networks to improve peer-to-peer networking. In: Proceedings of the eleventh ACM SIGKDD international conference on knowledge discovery in data mining. ACM; 2005. Galuba Wojciech, et al. Outtweeting the twitterers-predicting information cascades in microblogs. In: Proceedings of the 3rd conference on online social networks. USENIX Association; 2010. Gomez Rodriguez Manuel, Leskovec Jure, Krause Andreas. Inferring networks of diffusion and influence. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining. ACM; 2010. Guo, 2013, Opportunistic IoT: exploring the harmonious interaction between human and the Internet of things, J Netw Comput Appl, Elsevier, 36, 1531, 10.1016/j.jnca.2012.12.028 Gupta, 2009, MobiSoC: a middleware for mobile social computing applications, Mobile Netw Appl, 14, 35, 10.1007/s11036-008-0114-9 Haifeng, 2006, Sybilguard: defending against sybil attacks via social networks, ACM SIGCOMM Comput Commun Rev, 36, 267, 10.1145/1151659.1159945 Haight, 1967, 100 Hwang, 2011, 12 Itbusinessedge.com. Government agencies establishing presence on social-networking sites [retrieved 13.03.11]. Jolliffe, 2005 Kleinberg, 2008, The convergence of social and technological networks, Commun ACM, 51, 66, 10.1145/1400214.1400232 Kwak Haewoon, Lee Changhyun, Park Hosung, Moon Sue. What is Twitter, a social network or a news media? In: Proceedings of the 19th international conference on world wide web. ACM; 2010. Leskovec, 2007, The dynamics of viral marketing, ACM Trans Web (TWEB), 1, 5, 10.1145/1232722.1232727 Liben-Nowell, 2008, Tracing information flow on a global scale using Internet chain-letter data, Proc Natl Acad Sci, 105, 4633, 10.1073/pnas.0708471105 Marti, 2005, SPROUT: P2P routing with social networks Malmgren, 2008, A Poissonian explanation for heavy tails in e-mail communication, Proc Natl Acad Sci, 105, 18153, 10.1073/pnas.0800332105 Mei Alessandro, Morabito Giacomo, Santi Paolo, Stefa Julinda. Social-aware stateless forwarding in pocket switched networks. In: Infocom, 2011 proceedings of IEEE; 2011. Mislove Alan, Gummadi Krishna P., Druschel Peter. Exploiting social networks for internet search. In: Proceedings of the 5th workshop on Hot Topics in Networks (HotNets06). Citeseer; 2006. OSTP. Press release announcing review [retrieved 13.03.11]. Peng Huan-Kai, Zhu Jiang, Piao Dongzhen, Yan Rong, Zhang Ying. Retweet modeling using conditional random fields. In: Proceedings of the 2011 IEEE 11th International Conference on Data Mining Workshops (ICDMW); 2011. Perline, 2005, Strong, weak and false inverse power laws, Stat Sci, 20, 68, 10.1214/088342304000000215 Sandes, 2012, Logical model of relationship for online social networks and performance optimizing of queries, 726 Suh Bongwon, Hong Lichan, Pirolli Peter, Chi Ed H. Want to be retweeted? Large scale analytics on factors impacting retweet in twitter network. In: Proceedings of the 2010 IEEE second international conference on social computing (SocialCom); 2010. Sun, 2009 Szabo, 2010, Predicting the popularity of online content, Commun ACM, 53, 80, 10.1145/1787234.1787254 Vastardis, 2012, 1 Wu, 2007, Novelty and collective attention, Proc Natl Acad Sci, 104, 17599, 10.1073/pnas.0704916104 Yang Zi, Guo Jingyi, Cai Keke, Tang Jie, Li Juanzi, Zhang Li, et al. Understanding retweeting behaviors in social networks. In: Proceedings of the 19th ACM international conference on information and knowledge management. ACM; 2010. Zarrella Dan. Science of retweets [retrieved 15.12.09].