Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
A method for sharing online assisted teaching resources based on mobile social networks
International Journal of Computer Applications in Technology (IJCAT), Volume 73, Issue 4Pages 333–344https://doi.org/10.1504/ijcat.2023.138833In order to solve the problems of high latency and average routing hops in existing teaching resource sharing methods, a new online assisted teaching resource sharing method based on mobile social networks is proposed. Firstly, combining temporal ...
- research-articleMay 2020
Next POI Recommendation Based on Location Interest Mining with Recurrent Neural Networks
Journal of Computer Science and Technology (JCST), Volume 35, Issue 3Pages 603–616https://doi.org/10.1007/s11390-020-9107-3AbstractIn mobile social networks, next point-of-interest (POI) recommendation is a very important function that can provide personalized location-based services for mobile users. In this paper, we propose a recurrent neural network (RNN)-based next POI ...
- research-articleAugust 2017
Exploring Communication Behaviors of Users to Target Potential Users in Mobile Social Networks
ACM Transactions on Intelligent Systems and Technology (TIST), Volume 8, Issue 6Article No.: 79, Pages 1–22https://doi.org/10.1145/3022472In mobile communication services, users can communicate with each other over different telecommunication carriers. For telecom operators, how to acquire and retain users is a significant and practical task. Note that telecom operators only have their ...
- articleOctober 2016
SAFE-CROWD: secure task allocation for collaborative mobile social network
Security and Communication Networks (SACN), Volume 9, Issue 15Pages 2686–2695https://doi.org/10.1002/sec.1261With the pervasive use of smart mobile devices and increasing wireless networking technologies, collaborations among mobile users are becoming deeper and ubiquitous. Appropriate task collaborations among mobile users could effectively improve the network ...
- invited-talkJune 2015
Security and Privacy in Mobile Social Networks
MobiMWareHN '15: Proceedings of the ACM International Workshop on Mobility and MiddleWare Management in HetNetsPage 1https://doi.org/10.1145/2757757.2757760Nowadays, people across the world are increasingly turning to social media, and industries are also starting to embrace it to improve and broaden their businesses. Social media represents a virtual community in which people with a shared interest, such ...
-
- research-articleJune 2015
When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services
MobiHoc '15: Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and ComputingPages 147–156https://doi.org/10.1145/2746285.2746315The recent development of social services tightens wireless users' social relationships and encourages them to generate more data traffic under network effect. This boosts the demand for wireless services yet may challenge the limited wireless capacity. ...
- articleFebruary 2015
Contact duration aware evaluation for content dissemination delay in mobile social network
Wireless Communications & Mobile Computing (WCMC), Volume 15, Issue 3Pages 527–537https://doi.org/10.1002/wcm.2355Groups of people with mobile phones using short-range connections such as WiFi and Bluetooth to propagate messages can be modeled as, with regard to regular absence of end-to-end connection, mobile social networks MSNs, which can be exploited to offload ...
- research-articleAugust 2014
Inferring user demographics and social strategies in mobile social networks
KDD '14: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data miningPages 15–24https://doi.org/10.1145/2623330.2623703Demographics are widely used in marketing to characterize different types of customers. However, in practice, demographic information such as age, gender, and location is usually unavailable due to privacy and other reasons. In this paper, we aim to ...
- research-articleAugust 2014
All your location are belong to us: breaking mobile social networks for automated user location tracking
MobiHoc '14: Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computingPages 43–52https://doi.org/10.1145/2632951.2632953Location-based social networks (LBSNs) feature friend discovery by location proximity that has attracted hundreds of millions of users world-wide. While leading LBSN providers claim the well-protection of their users' location privacy, for the first ...
- research-articleApril 2014
From offline to online: connecting people with a mobile social networking application at a conference
Chinese CHI '14: Proceedings of the Second International Symposium of Chinese CHIPages 40–49https://doi.org/10.1145/2592235.2592242People that we encounter and connect with at conferences, provide opportunities for extending our social networks from offline to online. How can users easily find and connect with the relevant people in the conference? We present Find & Connect, an ...
- research-articleMarch 2014
A detection of overlapping community in mobile social network
SAC '14: Proceedings of the 29th Annual ACM Symposium on Applied ComputingPages 175–179https://doi.org/10.1145/2554850.2554999Detecting a community structure reduces a complexity of networks consisted of large datasets, which is important to manage and understand core groups of the network. Especially, to accurately find a community structure, it is necessary to analyze and ...
- ArticleDecember 2013
A Privacy Preserving Matchmaking Scheme for Multiple Mobile Social Networks
Algorithms and Architectures for Parallel ProcessingPages 233–240https://doi.org/10.1007/978-3-319-03889-6_27AbstractMobile social networks (MSNs) enable users to discover and interact with existing and potential friends in both the cyberspace and in the real world. Although mobile social network applications bring us much convenience, privacy concerns become ...
- ArticleDecember 2013
News Feeds Optimization via Users' Interaction Graph over Mobile Social Networks
CLOUDCOM-ASIA '13: Proceedings of the 2013 International Conference on Cloud Computing and Big DataPages 127–132https://doi.org/10.1109/CLOUDCOM-ASIA.2013.80Online social networks are increasingly playing roles of propagating news. We are surrounded with diverse data every day in today's information exploding era and suffer from the littery contents. Furthermore, due to most users of online social networks ...
- research-articleSeptember 2013
Can you form healthy habit?: predicting habit forming states through mobile phone
BodyNets '13: Proceedings of the 8th International Conference on Body Area NetworksPages 144–147https://doi.org/10.4108/icst.bodynets.2013.253658Health-compromising behaviors are difficult to change since people do not behave in accordance with their intention. This paper aims at studying the extent to which a person's healthy habit forming process can be affected by mobile phone usage. We ...
- ArticleSeptember 2013
Analyzing Community Core Evolution in Mobile Social Networks
SOCIALCOM '13: Proceedings of the 2013 International Conference on Social ComputingPages 154–161https://doi.org/10.1109/SocialCom.2013.30Community detection in social networks attracts a lot of attention in recent years. Existing methods always depict the relationship of two nodes using the temporary connection. However, these temporary connections cannot be fully recognized as the real ...
- research-articleAugust 2013
The user's communication patterns on a mobile social network site
SNAKDD '13: Proceedings of the 7th Workshop on Social Network Mining and AnalysisArticle No.: 12, Pages 1–6https://doi.org/10.1145/2501025.2501037Given that users are simultaneously connected in multiple communication channels in a social networking service site (e.g., chat, message, and group message), we explore user's collective networking behavior. We collected the data from a mobile social ...
- research-articleJuly 2013
Connecting people through physical proximity and physical resources at a conference
ACM Transactions on Intelligent Systems and Technology (TIST), Volume 4, Issue 3Article No.: 50, Pages 1–21https://doi.org/10.1145/2483669.2483683This work investigates how to bridge the gap between offline and online behaviors at a conference and how the physical resources in the conference (the physical objects used in the conference for gathering attendees together in engaging an activity such ...
- ArticleJune 2013
Blind chance: on potential trust friends query in mobile social networks
WAIM'13: Proceedings of the 14th international conference on Web-Age Information ManagementPages 557–563https://doi.org/10.1007/978-3-642-38562-9_56Potential-Trust-Friends-Query is an important query in mobile social network, as it enables users to discover and interact with others happen to be in their physical vicinity. In our context, we attempt to find top-k mobile users for such query. We ...
- ArticleMay 2013
Context-Aware Community: Integrating Contexts with Contacts for Proximity-Based Mobile Social Networking
DCOSS '13: Proceedings of the 2013 IEEE International Conference on Distributed Computing in Sensor SystemsPages 141–148https://doi.org/10.1109/DCOSS.2013.16Sensor-equipped mobile devices have allowed users to participate in various social networking services while they are on the go. We focus on proximity-based mobile social networking environments where users share information obtained from different ...
- research-articleFebruary 2013
Mining smartphone data to classify life-facets of social relationships
CSCW '13: Proceedings of the 2013 conference on Computer supported cooperative workPages 285–294https://doi.org/10.1145/2441776.2441810People engage with many overlapping social networks and enact diverse social roles across different facets of their lives. Unfortunately, many online social networking services reduce most people's contacts to "friend". A richer computational model of ...