• Volume 25,Issue 12,2014 Table of Contents
    Select All
    Display Type: |
    • >Special Issue's Articles
    • Causality and Its Applications in Social Media: A Survey

      2014, 25(12):2733-2752. DOI: 10.13328/j.cnki.jos.004724 CSTR:

      Abstract (6654) HTML (3476) PDF 846.09 K (9450) Comment (0) Favorites

      Abstract:The main objective of many studies in the physical, behavioral, social, and biological sciences is the elucidation of cause-effect relationships among variables or events. Many causality problems, occur when new words and behaviors are mapped from individuals to the Internet or are created by the Internetitself. Causality is hidden behind correlations; conclusion made by correlation analysis is likely to be unreliable or even wrong; and in absence of causality, methods based on correlation is unable to intervene, control and manage. Thus, causal analysis is necessary in social media. This paper first introduces the value, importance, and necessity of causality analysis, followed by causality problems existing in social media. Then, a brief overview of the recent research on causal inference is provided with analysis basic theory, problems and research status. Finally, comparisons among previous studies are made to suggest the future research directions and causality application in social media

    • Approaches of Structure Exploratory Based on Probabilistic Models in Massive Networks

      2014, 25(12):2753-2766. DOI: 10.13328/j.cnki.jos.004722 CSTR:

      Abstract (6038) HTML (1927) PDF 483.34 K (8233) Comment (0) Favorites

      Abstract:The growth of the Internet and the emergence of online social websites bring up the development of massive networks which are large in scale, complex in structure, and dynamical in time. Exploring latent structure underlying a network is the fundamental solution to understand and analyze the network. Probabilistic models become effective tools in diverse areas of structure exploratory due to their flexibility in modeling, interpretability and the sound theoretical framework, however they incur computational bottlenecks. Recently, several approaches based on probabilistic models have been developed to explore structure in massive networks, which aim to solve the computational problems from three aspects: representations of a network, assumptions of the structure and methods of parameter estimation. This study classifies existing approaches as two categories by the methods of parameter estimation: approaches based on stochastic variational inference and online EM approaches, and analyzes in detail their designing incentives, principles, pros and cons. The properties and performance of classical models are compared and analyzed qualitatively and quantitatively, and as a result the principles are provided to develop approaches of structure detection in massive networks. Finally, the core problems of structure exploratory in massive networks are summarized based on probabilistic models and the development trend of this area is projected.

    • Predicting Popularity of Forum Threads Based on Dynamic Evolution

      2014, 25(12):2767-2776. DOI: 10.13328/j.cnki.jos.004730 CSTR:

      Abstract (6891) HTML (2160) PDF 408.63 K (7525) Comment (0) Favorites

      Abstract:Web user's online interacting behavior with others usually makes some user generated content (e.g. forum threads and Weibo topics) popular. The modeling and prediction of the popularity of online content are of great research importance and practical value in many different domains. To predict the popularity of forum threads, this paper discusses several dynamic factors that might affect the popularity of online content based on the information of dynamic evolution at the early stage, and proposes a popularity prediction algorithm which makes use of the locality property and combines multiple dynamic factors. The proposed algorithm is further evaluated with the Douban group dataset. The experimental results show that, compared with the baseline methods, our method achieves relatively better performance in predicting the popularity of forum threads.

    • Online Comment Clustering Based on an Improved Semantic Distance

      2014, 25(12):2777-2789. DOI: 10.13328/j.cnki.jos.004729 CSTR:

      Abstract (6494) HTML (2056) PDF 619.94 K (7371) Comment (0) Favorites

      Abstract:An improved semantic distance for short text is proposed. The new method calculates the semantic distance between two word strings as balance of the extent of word sequence alignment and the meaning matching between word strings. First, after linguistic preprocessing, the extent of word sequence alignment is computed by the structural distance which measures the maximum matching based on the HIT-CIR Tongyici Cilin (extended edition). Then the meaning matching between word strings is computed by an improved edit distance which allocates each word a weight according to its word type. Finally, the semantic distance between the word strings is measured as a balance of structural distance and word meaning matching distance. In addition, in order to eliminate the influence of the sentence length, the proposed semantic distance is adjusted using the distinct word count estimated by the Heap's law and Zipf law. Experimental results show that the presented methods are more efficient than the classical edit distance models.

    • Sentiment Analysis Based on Light Reviews

      2014, 25(12):2790-2807. DOI: 10.13328/j.cnki.jos.004728 CSTR:

      Abstract (6466) HTML (2090) PDF 587.47 K (8492) Comment (0) Favorites

      Abstract:This paper researches the newly emerging user reviews (referred here as "light reviews") generated from smart mobile devices. The similarities and differences between this research and the early studies are pointed out. The unique characteristics of the light review can be summarized as having shorter texts, bigger span, and in most cases fewer words per review. The review length and scale also meet the power-law distribution. A series of experiments are studies based on light reviews, resulting in some interesting findings: (1) There is an inverse relationship between classification accuracy and review length; (2) The traditional classical feature selection and feature weight method do not perform well enough on light reviews; (3) The polar word ratio in short reviews, which is the most important feature in sentiment analysis, is higher than in long reviews; (4) There is a higher shared feature term proportion between short review and long review. Based on above studies, the paper puts forward a feature selection method based on short text co-occurrence feature. By combining the information advantages in short reviews with the traditional feature selection methods, the presented method preserves useful information and details as much as possible while removing noise. The results of experiment show that the method is effective and the classification rate is higher.

    • User Community Detection on Micro-Blog Using R-C Model

      2014, 25(12):2808-2823. DOI: 10.13328/j.cnki.jos.004720 CSTR:

      Abstract (6216) HTML (2035) PDF 1.09 M (7841) Comment (0) Favorites

      Abstract:Detecting user communities with denser common interests and network structure plays an important role in target marketing and self-oriented services. User-Generated content and the relationship between the users are often separated in the current methods on community detection, which results in the unreasonable community structures. Though some methods tried to combine the two factors, they are complex. Link community algorithm (LCA) is an efficient state-of-art method on overlapping community discovery. However, LCA does not take into account the real interest characteristics when calculating the similarity between the links. To solve the issues on user community detection on Micro-blog, this paper proposes a R-C model which takes the user relationships as the network nodes, treats the intersection of the interest characteristics of the two users in a link as the link's interest characteristics, and makes the shared user between two links as the underlying link between the links. Also, the community detection method based on the R-C model is discussed, and the complexity in clustering is analyzed. Finally, compared with node CNM and LCA, the method using R-C model is proved to be better in finding closer relationship and denser common interest user communities.

    • Overlapping Community Discovery and Global Representation on MicroBlog Network

      2014, 25(12):2824-2836. DOI: 10.13328/j.cnki.jos.004721 CSTR:

      Abstract (6074) HTML (1958) PDF 628.30 K (7329) Comment (0) Favorites

      Abstract:Micro-Blog cyberspace is a booming multiple mode network of numerous overlapping communities covering huge amount of users and topics relating to the nature, the society and the everyday life. Based on in depth analysis on the entities and inherent relationships among the network, this paper purposes a user-topic relation dominated structural module for overlapping community representation and detection, and also infuses the follow relationship along with the blog-forward and blog-comment relationship into the module. By introducing a virtual community into the actual communities of the network, the paper also puts forward an improved global belongingness matrix as user's role representation which has the ability to properly describe a user's degree of participation and importance in the network. Experimental results on Sina's micro-blog dataset show that the new method is favorable and efficient for finding meaningful communities from the micro-blog. Furthermore, the proposed module and algorithms can be adapted in various ways for similar social network analysis and helpful for community evolution research.

    • Observer Deployment Method for Locating the Information Source in Social Network

      2014, 25(12):2837-2851. DOI: 10.13328/j.cnki.jos.004723 CSTR:

      Abstract (6149) HTML (1987) PDF 670.85 K (7042) Comment (0) Favorites

      Abstract:Locating information source accurately is important for controlling its diffusion on the social network. In previous studies, a feasible way is locating the source using process information collected by the observers. Thus, the accuracy rate is closely related to the observer positions. In this paper, an optimal deployment method for observer positions is proposed. Considering the information diffusion process for single source, it firstly analyzes the relationship between the accuracy rate for locating a specified source and the positions of observers. Based on the relationship, it finds a key factor which is related to the accuracy rate of locating any source. It then suggests a method to deploy the observer positions based on r-coverage rate. It chooses the r-coverage rate of the observers as the objective function to implement the r-coverage rate first observer selection algorithm. The proposed method is tested on model and real networks respectively. Results show that the proposed method is effective. The observer deployment method is significant in controlling internet rumors and computer virus.

    • Social Recommendations Based on User Trust and Tensor Factorization

      2014, 25(12):2852-2864. DOI: 10.13328/j.cnki.jos.004725 CSTR:

      Abstract (6515) HTML (2388) PDF 494.41 K (10712) Comment (0) Favorites

      Abstract:In social networks, recommender systems can help users to deal with information overload and provide personalized recommendations to them. The trust relationship of users is used in the social networks' recommender systems. But the state-of-art algorithms only use the single trust relationship which cannot capture the trust to user's friends when looking for different items. This paper proposes a topic-based trust recommendation algorithm using tensor factorization model. As the social information changes rapidly, the state-of-art algorithms often need redo factorization. To address the issue, the paper also presents an effective incremental method to adaptively update its previous factorized components rather than re-computing them on the whole dataset when the data changes. Experiments show that the proposed method can achieve better performance and the incremental method is suitable for the rapid changes in the social networks.

    • Performance Analysis of Clustering-Based Transductive Learning

      2014, 25(12):2865-2876. DOI: 10.13328/j.cnki.jos.004726 CSTR:

      Abstract (6216) HTML (2043) PDF 464.59 K (6601) Comment (0) Favorites

      Abstract:Recently, Twitter search has drawn much attention of researchers in social networks. Although rich features of Twitter can be incorporated into rank learning, the retrieval effectiveness can be hurt by the lack of training data. Transductive learning, as a common semi-supervised learning method, has been playing an import role in dealing with the lacking of training data. Due to the fact that noise is generated during the iterative process of transductive learning, a clustering-based transductive method is proposed. There exist two important parameters in the clustering-based transductive approach, namely the threshold of clustering and the number of the documents that will be clustered. This paper extends the method by utilizing a different clustering algorithm. As shown by extensive experiments on the standard TREC Tweets11 collection, both of the two parameters have an effect on the retrieval effectiveness. Furthermore, the robustness of the clustering-based transduction approach on different query sets is also studied. Finally, the paper proposes an adaptive clustering-based approach by introducing a so called cluster coherence as quality controller. The experimental results show that the robustness of the proposed method is better.

    • Study on Social Network Forensics

      2014, 25(12):2877-2892. DOI: 10.13328/j.cnki.jos.004727 CSTR:

      Abstract (5981) HTML (2283) PDF 1.07 M (8644) Comment (0) Favorites

      Abstract:Based on advances in computing technology and information technology, social networks have emerged as a new tool for people to exchange information and build interaction networks, and have become a key topic for social software studies in social computing. Social network forensics seeks to acquire, organize, analyze and visualize user information as direct, objective and fair evidence from a third-party perspective. Along with the rapid development of the Internet, social network forensics faces new challenges in dealing with user information being diverse, real-time and dynamic, huge in volume, and interactive, and also photo trustworthiness. It therefore has become a hot issue for opinion analysis, affective computing, content analysis in social networking relations, as well as individual, group and social behaviors in social networks and social computing. This paper designs a forensic model for social network forensics, and implements it on Sina microblogging. This model provides user information analysis, facial image recognition, and location presentation for trustworthiness analysis of digital evidence, and applies visualization to help reduce the difficulty of analysis and forensics on massive data from social networks.

    • Trust Prediction Modeling Based on Social Theories

      2014, 25(12):2893-2904. DOI: 10.13328/j.cnki.jos.004731 CSTR:

      Abstract (7140) HTML (2085) PDF 456.04 K (8155) Comment (0) Favorites

      Abstract:With the pervasion of social media, trust, as the basis of human interactions, has been playing an important role in addressing information sharing, experience communication, and public opinions. However, trust is a complex and abstract concept influenced by many factors, and it is difficult to identify the inducing factors and analyze the formation mechanism. Recognizing that social theories from social sciences are helpful to explain social phenomena, and social networks reflect user correlations in real world, this paper investigatethes trust prediction problem from the perspective of social science, and constructs trust prediction model by studying the disciplines of trust relations occurring and developing based on social status theory and homophily theory. Firstly, it gives a brief introduction to social status theory and homophily theory, and verifies the existence of social status theory and homophily theory in social networks. Then, it proposes social status regularization and homophily regularization according to the effects of social status theory and homophily theory in predicting trust relations. Lastly, it models trust prediction by incorporating non-negative matrix tri-factorization, social status theory and homophily theory, and establishes trust prediction model SocialTrust. Experimental results demonstratethe effectiveness of the proposed method in trust prediction with a higher accuracy than other baseline methods.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《Journal of Software 》
  • 主办单位:Institute of Software, CAS, China
  • 邮编:100190
  • 电话:010-62562563
  • 电子邮箱:jos@iscas.ac.cn
  • 网址:https://www.jos.org.cn
  • 刊号:ISSN 1000-9825
  •           CN 11-2560/TP
  • 国内定价:70元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063