<--- Back to Details
First PageDocument Content
Software / Computing / Technology / Social networking services / Universal Windows Platform apps / Social networks / Applied statistics / Twitter / Twitter usage / Internet privacy / Geotagging / Social media
Date: 2015-10-13 11:15:56
Software
Computing
Technology
Social networking services
Universal Windows Platform apps
Social networks
Applied statistics
Twitter
Twitter usage
Internet privacy
Geotagging
Social media

Identification of Key Locations based on Online Social Network Activity Hariton Efstathiades, Demetris Antoniades, George Pallis and Marios D. Dikaiakos Dept. of Computer Science, University of Cyprus Nicosia, Cyprus Ema

Add to Reading List

Source URL: www.cs.ucy.ac.cy

Download Document from Source Website

File Size: 673,79 KB

Share Document on Facebook

Similar Documents

Hub Human Trust Protocol Eric Ly, Rich Miller, Miko Matsumura “The currency of the new economy is trust” – Rachel Botsman [1] Abstract Whether through messaging systems, online communities, social networks, or the

Hub Human Trust Protocol Eric Ly, Rich Miller, Miko Matsumura “The currency of the new economy is trust” – Rachel Botsman [1] Abstract Whether through messaging systems, online communities, social networks, or the

DocID: 1xVAU - View Document

What Makes a Music Track Popular in Online Social Networks? Jing Ren Jialie Shen

What Makes a Music Track Popular in Online Social Networks? Jing Ren Jialie Shen

DocID: 1xURM - View Document

Online Actions with Offline Impact: How Online Social Networks Influence Online and Offline User Behavior Tim Althoff Pranav Jindal

Online Actions with Offline Impact: How Online Social Networks Influence Online and Offline User Behavior Tim Althoff Pranav Jindal

DocID: 1xUv8 - View Document

IVD :  Automatic Learning and Enforcement of Authorization Rules in Online Social Networks Paul Marinescu† , Chad Parry† , Marjori Pomarole† , Yuan Tian‡ , Patrick Tague‡ , Ioannis Papagiannis† † Facebook.

IVD : Automatic Learning and Enforcement of Authorization Rules in Online Social Networks Paul Marinescu† , Chad Parry† , Marjori Pomarole† , Yuan Tian‡ , Patrick Tague‡ , Ioannis Papagiannis† † Facebook.

DocID: 1xUtp - View Document

Accurate Path-based Methods for Influence Maximization in Social Networks Yun-Yong Ko Dong-Kyu Chae

Accurate Path-based Methods for Influence Maximization in Social Networks Yun-Yong Ko Dong-Kyu Chae

DocID: 1xUrx - View Document