2008 IEEE Conference on Technologies for Homeland Security 2008
DOI: 10.1109/ths.2008.4637294
|View full text |Cite
|
Sign up to set email alerts
|

Discovery, analysis and monitoring of hidden social networks and their evolution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…The algorithm was previously developed and applied successfully in inter-personal social networks to detect and analyze overlapping communities. In social networks, such communities are common, since many people are involved in more than one groups reflecting their various interests (Baumes et al, 2008;Goldberg et al, 2008Goldberg et al, , 2010. CIS starts by taking each vertex of the graph as a candidate set and attempting to add/delete each other vertex into the set as suggested by a density metric based on the input and output weights of the whole set.…”
Section: Introductionmentioning
confidence: 99%
“…The algorithm was previously developed and applied successfully in inter-personal social networks to detect and analyze overlapping communities. In social networks, such communities are common, since many people are involved in more than one groups reflecting their various interests (Baumes et al, 2008;Goldberg et al, 2008Goldberg et al, , 2010. CIS starts by taking each vertex of the graph as a candidate set and attempting to add/delete each other vertex into the set as suggested by a density metric based on the input and output weights of the whole set.…”
Section: Introductionmentioning
confidence: 99%
“…While coordination patterns are used to lead a reverse engineering to recover architectural decisions, and are focused on low-level compositions of code, the architectural/design patterns work at a higher level, being used to define the architecture of a system in earlier phases of the software development process [16]. Patterns and patterns finding are a very interesting matter on data mining discipline [5], and are being applied on several areas, with focus on social networks [18,13]. Although the work reported in this paper is far from the area of data mining and social networks, the purpose of CoordL is to extract useful information based on patterns that are a result of previous knowledge on how coordination of components is made.…”
Section: Related Workmentioning
confidence: 99%
“…Pedro Rangel Henriques has supervised Ph.D. (11), and M.Sc. (13) thesis, and more than 50 graduating trainingships/projects, in the areas of: language processing (textual and visual), and structured document processing; code analysis, program visulaization/animation and program comprehension; knowledge discovery from databases, data-mining, and data-cleaning. He is co-author of the "XML & XSL: da teoria a pr ática" book, published by FCA in 2002; and has published 3 chapters in books, and 20 journal papers.…”
mentioning
confidence: 99%
“…Here, we discuss about the new emerging means of communication and interaction is computer vision. Since computer vision techniques are being used tremendously in many areas of surveillance systems, face recognition [2,19], crowd tracking [15,16], detecting, recognizing and analysis of activities [17,18] and events.…”
Section: Introductionmentioning
confidence: 99%