Bibliography

  [1] T. O’Reilly. What is Web 2.0 - design patterns and business models for the next generation of software. http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-isweb-20.html, September 2005.

  [2] D. Gillmor. We the Media: Grassroots Journalism by the People, for the People. O’Reilly, 2006.

  [3] R. Scoble and S. Israel. Naked conversations: how blogs are changing the way businesses talk with customers. John Wiley, 2006.

  [4] M. Richardson and P. Domingos. Mining knowledge-sharing sites for viral marketing. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 61–70, New York, NY, USA, 2002. ACM Press. DOI: 10.1145/775047.775057

  [5] D. Gruhl, R. Guha, R. Kumar, J. Novak, and A. Tomkins. The predictive power of online chatter. In Proceeding of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pages 78–87, New York, NY, USA, 2005. ACM Press. DOI: 10.1145/1081870.1081883

  [6] G. Mishne and M. Rijke. Deriving wishlists from blogs show us your blog, and we’ll tell you what books to buy. In Proceedings of the Fifteenth International Conference on World Wide Web, pages 925–926, New York, NY, USA, 2006. ACM Press. DOI: 10.1145/1135777.1135947

  [7] T. Coffman and S. Marcus. Dynamic Classification of Groups Through Social Network Analysis and HMMs. In Proceedings of IEEE Aerospace Conference, pages 3197 – 3205, 2004.

  [8] Mike Thelwall. Bloggers under the London attacks: Top information sources and topics. In Proceedings of the Third Annual Workshop on Webloging Ecosystem: Aggreation, Analysis and Dynamics, 2006.

  [9] N. Agarwal, H. Liu, S. Murthy, A. Sen, and X. Wang. A social identity approach to identify familiar strangers in a social network. In Proceedings of the Third International AAAI Conference of Weblogs and Social Media, pages 2–9, 2009.

[10] J. Q. Fang and Y Liang. Topological properties and transition features generated by a new hybrid preferential model. Chin. Phys. Lett., 22(10):2719–2722, 2005. DOI: 10.1088/0256-307X/22/10/072

[11] F. Chung and L. Lu. Complex graphs and networks. In Cbms Regional Conference Series in Mathematics, 2006.

[12] Vicenç Gómez, Andreas Kaltenbrunner, and Vicente López. Statistical analysis of the social network and discussion threads in slashdot. In Proceeding of the 17th international conference on World Wide Web (WWW), pages 645–654, 2008. DOI: 10.1145/1367497.1367585

[13] A. Ng, M. Jordan, and Y Weiss. On spectral clustering: analysis and an algorithm. Advances in Neural Information Processing Systems 14. MIT Press. (Ed: T. Dietterich and S. Becker and Z. Ghahramani), 2002.

[14] J. Shi and J. Malik. Normalized cuts and image segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(8):888–905, 2000. DOI: 10.1109/34.868688

[15] L. Hagen and A.B. Kahng. New spectral methods for ratio cut partitioning and clustering. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 11(9):1074–1085, 1992. DOI: 10.1109/43.159993

[16] U. Luxburg. A tutorial on spectral clustering. Statistics and Computing, 17(4):395–416, 2007. DOI: 10.1007/s11222-007-9033-z

[17] Y. Chi, X. Song, D. Zhou, K. Hino, and B.L. Tseng. Evolutionary spectral clustering by incorporating temporal smoothness. In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 153–162. ACM New York, NY, USA, 2007. DOI: 10.1145/1281192.1281212

[18] H. Ning, W. Xu, Y. Chi, Y. Gong, and T. Huang. Incremental spectral clustering with application to monitoring of evolving blog communities. In SIAM International Conference on Data Mining, 2007.

[19] Y. Chi, S. Zhu, X. Song, J. Tatemura, and B.L. Tseng. Structural and temporal analysis of the blogosphere through community factorization. In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 163–172. ACM New York, NY, USA, 2007. DOI: 10.1145/1281192.1281213

[20] B. Li, S. Xu, and J. Zhang. Enhancing clustering blog documents by utilizing author/reader comments. In Proceedings of the 45th Annual Southeast Regional Conference, pages 94–99, New York, NY, USA, 2007. ACM Press. DOI: 10.1145/1233341.1233359

[21] C.H. Brooks and N. Montanez. Improved annotation of the blogosphere via autotagging and hierarchical clustering. In Proceedings of the Fifteenth International Conference on World Wide Web, pages 625–632, New York, NY, USA, 2006. ACM Press. DOI: 10.1145/1135777.1135869

[22] N. Agarwal, M. Galan, H. Liu, and S. Subramanya. Clustering blogs with collective wisdom. In Proceedings of the International Conference on Web Engineering, 2008. DOI: 10.1109/ICWE.2008.9

[23] A. Java, A. Joshi, and T. Finin. Detecting commmunities via simultaneous clustering of graphs and folksonomies. In Proceedings of the Tenth Workshop on Web Mining and Web Usage Analysis (WebKDD). ACM, 2008.

[24] Q. Xu, M. desJardins, and K. Wagstaff. Active constrained clustering by examining spectral eigenvectors. Discovery Science, pages 294–307, 2005. DOI: 10.1007/11563983_25

[25] E. Keller and J. Berry. One American in ten tells the other nine how to vote, where to eat and, what to buy. They are The Influentials. The Free Press, 2003.

[26] T. Elkin. Just an online minute . . . online forecast. http://publications.mediapost.com/index.cfm?fuseaction =Articles.showArticle art aid=29803.

[27] D. Drezner and H. Farrell. The power and politics of blogs. In American Political Science Association Annual Conference, 2004. DOI: 10.1007/s11127-007-9198-1

[28] S. Brin and L. Page. The anatomy of a large-scale hypertextual Web search engine. In Proceedings of the Seventh International Conference on World Wide Web, pages 107 – 117, 1998. DOI: 10.1016/S0169-7552(98)00110-X

[29] J. Kleinberg. Authoritative sources in a hyperlinked environment. In 9th ACM-SIAM Symposium on Discrete Algorithms, 1998. DOI: 10.1145/324133.324140

[30] A. Kritikopoulos, M. Sideri, and I. Varlamis. Blogrank: ranking weblogs based on connectivity and similarity features. In Proceedings of the Second International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications, page 8, New York, NY, USA, 2006. ACM Press. DOI: 10.1145/1190183.1190193

[31] K.E. Gill. How can we measure the influence of the blogosphere? In Proceedings of the Workshop on the Weblogging Ecosystem: Aggregation, Analysis and Dynamics, 2004.

[32] M. Faloutsos, P. Faloutsos, and C. Faloutsos. On power-law relationships of the internet topology. In Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, pages 251–262, 1999. DOI: 10.1145/316188.316229

[33] C. Anderson. The long tail : why the future of business is selling less of more. New York: Hyperion, 2006.

[34] J. Leskovec, M. McGlohon, C. Faloutsos, N. Glance, and M. Hurst. Cascading behavior in large blog graphs. In SIAM International Conference on Data Mining, 2007.

[35] J. Goldenberg, B. Libai, and E. Muller. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters, 12:211 – 223, 2001. DOI: 10.1023/A:1011122126881

[36] D. Gruhl, David Liben-Nowell, R. Guha, and A. Tomkins. Information diffusion through blogspace. SIGKDD Exploration Newsletter, 6(2):43–52, 2004. DOI: 10.1145/1046456.1046462

[37] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In Proceedings of the International Conference on Knowledge Discovery and Data Mining, pages 137–146, New York, NY, USA, 2003. ACM Press. DOI: 10.1145/956750.956769

[38] A. Java, P. Kolari, T. Finin, and T. Oates. Modeling the spread of influence on the blogosphere. In Proceedings of the Fifteenth International World Wide Web Conference, 2006.

[39] Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, and Natalie Glance. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 420–429, New York, NY, USA, 2007. ACM. DOI: 10.1145/1281192.1281239

[40] S. Nakajima, J. Tatemura, Y. Hino, Y. Hara, and K. Tanaka. Discovering important bloggers based on analyzing blog threads. In Annual Workshop on the Weblogging Ecosystem, 2005.

[41] D.J. Watts and P.S. Dodds. Influentials, networks, and public opinion formation. JOURNAL OF CONSUMER RESEARCH, 34(4):441, 2007. DOI: 10.1086/518527

[42] D.J. Watts. Challenging the influentials hypothesis. WOMMA Measuring Word of Mouth, 3:201–211, 2007.

[43] J. Zhuang, S.C.H. Hoi, A. Sun, and R. Jin. Representative entry selection for profiling blogs. In Proceedings of the International Conference on Knowledge Management (CIKM). ACM New York, NY, USA, 2008. DOI: 10.1145/1458082.1458293

[44] N. Agarwal, H. Liu, L. Tang, and P.S. Yu. Identifying the influential bloggers in a community. In Proccedings of the First ACM International Conference on Web Search and Data Mining (Video available at: http://videolectures.net/wsdm08_agarwal_iib/), pages 207 – 218, 2008. DOI: 10.1145/1341531.1341559

[45] G.D. Fensterer. Planning and Assessing Stability Operations: A Proposed Value Focus Thinking Approach. PhD thesis, Air Force Institute of Technology, 2007.

[46] R. L. Keeney and H. Raiffa. Decisions with Multiple Objectives: Preferences and Value Tradeoffs. Cambridge University Press, 1993.

[47] R. Motwani and P. Raghavan. Randomized Algorithms. Cambridge University Press, 1995.

[48] G.H. Golub and C.F. Van Loan. Matrix Computations. Johns Hopkins University Press, 3rd edition edition, 1996.

[49] X. Ni, G. Xue, X. Ling, Y. Yu, and Q. Yang. Exploring in the weblog space by detecting informative and affective articles. In Proceedings of the 16th International Conference on World Wide Web, pages 281–290, New York, NY, USA, 2007. ACM. DOI: 10.1145/1242572.1242611

[50] X. Song, Y. Chi, K. Hino, and B. Tseng. Identifying opinion leaders in the blogosphere. In Proceedings of the Sixteenth ACM International Conference on Information and Knowledge Management, pages 971–974, New York, NY, USA, 2007. ACM. DOI: 10.1145/1321440.1321588

[51] P. Sztompka. Trust: A sociological theory. Cambridge Univ Pr, 1999.

[52] R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. In Proceedings of the Thirteenth International Conference on World Wide Web, pages 403–412, New York, NY, USA, 2004. ACM Press. DOI: 10.1145/988672.988727

[53] L. Terveen and D.W. McDonald. Social matching: A framework and research agenda. ACM Transactions on Computer Human Interaction, 12(3):401–434, 2005. DOI: 10.1145/1096737.1096740

[54] J. Golbeck and J. Hendler. Inferring binary trust relationships in web-based social networks. ACM Transactions on Internet Technology, 6(4):497–529, 2006. DOI: 10.1145/1183463.1183470

[55] A. Kale, A. Karandikar, P. Kolari, A. Java, T. Finin, and A. Joshi. Modeling trust and influence in the blogosphere using link polarity. In International Conference on Weblogs and Social Media, 2007.

[56] P. Dwyer. Building trust with corporate blogs. In International Conference on Weblogs and Social Media, 2007.

[57] N. Agarwal and H. Liu. Trust in blogosphere. Encyclopedia of Database Systems, August 2009.

[58] Y. Lin, H. Sundaram, Y. Chi, J. Tatemura, and B. Tseng. Detecting splogs via temporal dynamics using self-similarity analysis. ACM Transactions of the Web, 2(1), 2008. DOI: 10.1145/1326561.1326565

[59] Z. Gyongyi, H. Garcia-Molina, and J. Pedersen. Combating web spam with trustrank. In Proceedings of the 30th International Conference on Very Large Data Bases (VLDB), 2004.

[60] L. Zhu, A. Sun, and B. Choi. Online spam-blog detection through blog search. In Proceedings of the Seventeenth ACM International Conference on Information and Knowledge Management (CIKM), pages 1347–1348, 2008. DOI: 10.1145/1458082.1458272

[61] J. Leskovec, J. Kleinberg, and C. Faloutsos. Graphs over time: densification laws, shrinking diameters and possible explanations. In Proceeding of the ACM SIGKDD international conference on Knowledge Discovery in Data mining (KDD), pages 177–187, 2005. DOI: 10.1145/1081870.1081893

[62] E. Kamaliha, F. Riahi, V. Qazvinian, and J. Adibi. Characterizing network motifs to identify spam comments. In IEEE International Conference on Data Mining Workshops, 2008. ICDMW’08, pages 919–928, 2008. DOI: 10.1109/ICDMW.2008.72

[63] A. Ntoulas, M. Najork, M. Manasse, and D. Fetterly. Detecting spam web pages through content analysis. In Proceedings of the 15th international conference on World Wide Web, pages 83–92, 2006. DOI: 10.1145/1135777.1135794

[64] G. Mishne, D. Carmel, and R. Lempel. Blocking blog spam with language model disagreement. In Proceedings of the First International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), 2005.

[65] Z. Gyongyi, P. Berkhin, Hector Garcia-Molina, and J. Pedersen. Link spam detection based on mass estimation. In Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB), 2006.

[66] P. Kolari, A. Java, T. Finin, T. Oates, and A. Joshi. Detecting spam blogs: A machine learning approach. In Proceedings of the 21st National Conference on Artificial Intelligence (AAAI), 2006.

[67] K. Burton, A. Java, and I. Soboroff. The icwsm 2009 spinn3r dataset. In Proceedings of the Third Annual Conference on Weblogs and Social Media (ICWSM), 2009.

[68] B. Salton and C. Buckley. Term weighting approaches in automatic text retrieval. Information Processing and Management, 24(5):513–523, 1988. DOI: 10.1016/0306-4573(88)90021-0

[69] H. Liu and H. Motoda. Feature selection for knowledge discovery and data mining. Springer, 1998.

[70] S. Deerwester, S.T. Dumais, G.W. Furnas, T.K. Landauer, and R. Harshman. Indexing by latent semantic analysis. Journal of the American Society for Information Science, 41:391–407, 1990. DOI: 10.1002/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9

[71] T. Hofmann. Probabilistic latent semantic indexing. In Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval, pages 50–57. ACM New York, NY, USA, 1999. DOI: 10.1145/312624.312649

[72] D.M. Blei, A.Y. Ng, and M.I. Jordan. Latent dirichlet allocation. The Journal of Machine Learning Research, 3:993–1022, 2003. DOI: 10.1162/jmlr.2003.3.4-5.993

[73] S. Prevost. An information structural approach to spoken language generation. In Proceedings of the 34th annual meeting on Association for Computational Linguistics, pages 294–301. Association for Computational Linguistics Morristown, NJ, USA, 1996. DOI: 10.3115/981863.981902

[74] C. Hayes and P. Avesani. Using tags and clustering to identify topic-relevant blogs. In International Conference on Weblogs and Social Media, 2007.

[75] N. Agarwal, S. Kumar, H. Liu, and M. Woodward. Blogtrackers: A tool for sociologists to track and analyze blogosphere. In Proceedings of the Third International AAAI Conference on Weblogs and Social Media (ICWSM), pages 359 – 360, 2009.

[76] N. Bansal and N. Koudas. Searching the blogosphere. In 10th International Workshop on the Web and Databases (WebDB 2007), 2007.

[77] J Lee. Exploring global terrorism data. ACM Crossroads, 15(2):7–14, 2008. DOI: 10.1145/1519390.1519393

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset