default search action
5. SBP 2013: Washington, DC, USA
- Ariel M. Greenberg, William G. Kennedy, Nathan Bos:
Social Computing, Behavioral-Cultural Modeling and Prediction - 6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013. Proceedings. Lecture Notes in Computer Science 7812, Springer 2013, ISBN 978-3-642-37209-4
Behavioral Science
- Mauricio Salgado:
The Evolution of Paternal Care. 1-10 - Nicholas Keller, Xiaolin Hu:
Parent Training Resource Allocation Optimization Using an Agent-Based Model of Child Maltreatment. 11-18 - Tomek Strzalkowski, Samira Shaikh, Ting Liu, George Aaron Broadwell, Jennifer Stromer-Galley, Sarah M. Taylor, Veena Ravishankar, Umit Boz, Xiaoai Ren:
Influence and Power in Group Interactions. 19-27 - Pavel Atanasov, Phillip Rescober, Eric Stone, Emile Servan-Schreiber, Barbara A. Mellers, Philip Tetlock, Lyle H. Ungar:
The Marketcast Method for Aggregating Prediction Market Forecasts. 28-37 - Juan Fernando Mancilla-Caceres, Eyal Amir, Dorothy Espelage:
Peer Nominations and Its Relation to Interactions in a Computer Game. 38-47 - Yves-Alexandre de Montjoye, Jordi Quoidbach, Florent Robic, Alex Pentland:
Predicting Personality Using Novel Mobile Phone-Based Metrics. 48-55 - Eunkyung Kim, Ravi Iyer, Jesse Graham, Yu-Han Chang, Rajiv T. Maheswaran:
Moral Values from Simple Game Play. 56-64 - Kenneth Joseph, Wei Wei, Kathleen M. Carley:
An Agent-Based Model for Simultaneous Phone and SMS Traffic over Time. 65-74 - Armin Ashouri Rad, Hazhir Rahmandad:
Reconstructing Online Behaviors by Effort Minimization. 75-82 - Lee Hoffer, Shah Jamal Alam:
"Copping" in Heroin Markets: The Hidden Information Costs of Indirect Sales and Why They Matter. 83-92 - Shade T. Shutters:
Cultural Polarization and the Role of Extremist Agents: A Simple Simulation Model. 93-101 - George Aaron Broadwell, Umit Boz, Ignacio Cases, Tomek Strzalkowski, Laurie Feldman, Sarah M. Taylor, Samira Shaikh, Ting Liu, Kit Cho, Nick Webb:
Using Imageability and Topic Chaining to Locate Metaphors in Linguistic Corpora. 102-110 - Anamaria Berea, Charles Twardy:
Automated Trading in Prediction Markets. 111-122
Health Sciences
- Marlon P. Mundt:
Social Network Analysis of Peer Effects on Binge Drinking among U.S. Adolescents. 123-134 - Edward Hak-Sing Ip, Qiang Zhang, Ji Lu, Patricia L. Mabry, Laurette Dubé:
Feedback Dynamic between Emotional Reinforcement and Healthy Eating: An Application of the Reciprocal Markov Model. 135-143 - Mathew D. McCubbins, Mark Turner, Nicholas Weller:
Testing the Foundations of Quantal Response Equilibrium. 144-153 - Jane Evans, Shannon Fast, Natasha Markuzon:
Modeling the Social Response to a Disease Outbreak. 154-163 - Ling Jiang, Christopher C. Yang, Jiexun Li:
Discovering Consumer Health Expressions from Consumer-Contributed Content. 164-174 - Yunzhong Liu, Yi Chen:
Patient-Centered Information Extraction for Effective Search on Healthcare Forum. 175-183 - Brian M. Gurbaxani, Troy D. Querec, Elizabeth R. Unger:
Controlling for Population Variances in Health and Exposure Risk Using Randomized Matrix Based Mathematical Modeling. 184-192 - Katherine Y. Chuang, Christopher C. Yang:
How Do E-Patients Connect Online? A Study of Social Support Roles in Health Social Networking. 193-200
Information Science
- Kevin S. Xu, Alfred O. Hero III:
Dynamic Stochastic Blockmodels: Statistical Models for Time-Evolving Networks. 201-210 - Jeon-Hyung Kang, Kristina Lerman, Lise Getoor:
LA-LDA: A Limited Attention Topic Model for Social Recommendation. 211-220 - Zhuoshu Li, Yu-Han Chang, Rajiv T. Maheswaran:
Graph Formation Effects on Social Welfare and Inequality in a Networked Resource Game. 221-230 - Mo Yu, Kang Zhao, John Yen, Derek Kreager:
Recommendation in Reciprocal and Bipartite Social Networks-A Case Study of Online Dating. 231-239 - David B. Bracewell, Marc T. Tomlinson:
In You We Follow: Determining the Group Leader in Dialogue. 240-248 - Matteo Magnani, Luca Rossi:
Pareto Distance for Multi-layer Network Analysis. 249-256 - Matteo Magnani, Luca Rossi:
Formation of Multiple Networks. 257-264 - Bert Huang, Angelika Kimmig, Lise Getoor, Jennifer Golbeck:
A Flexible Framework for Probabilistic Models of Social Trust. 265-273 - Shuguang Han, Daqing He, Peter Brusilovsky, Zhen Yue:
Coauthor Prediction for Junior Researchers. 274-283 - Jianbo Gao, Kalev H. Leetaru, Jing Hu, Claudio Cioffi-Revilla, Philip Schrodt:
Massive Media Event Data Analysis to Assess World-Wide Political Conflict and Instability. 284-292 - Tanwistha Saha, Huzefa Rangwala, Carlotta Domeniconi:
Sparsification and Sampling of Networks for Collective Classification. 293-302 - Lora Weiss, Erica Briscoe, Heather Hayes, Olga Kemenova, Sim Harbert, Fuxin Li, Guy Lebanon, Chris Stewart, Darby Miller Steiger, Dan Foy:
A Comparative Study of Social Media and Traditional Polling in the Egyptian Uprising of 2011. 303-310 - Kimberly Glasgow, Clayton Fink:
Hashtag Lifespan and Social Networks during the London Riots. 311-320 - Xiong Liu, Kaizhi Tang, Jeffrey T. Hancock, Jiawei Han, Mitchell Song, Roger Xu, Bob Pokorny:
A Text Cube Approach to Human, Social and Cultural Behavior in the Twitter Stream. 321-330 - Serpil Yuce, Nitin Agarwal, Rolf T. Wigand:
Mapping Cyber-Collective Action among Female Muslim Bloggers for the Women to Drive Movement. 331-340 - Kirk Ogaard, Heather Roy, Sue E. Kase, Rakesh Nagi, Kedar Sambhoos, Moises Sudit:
Discovering Patterns in Social Networks with Graph Matching Algorithms. 341-349 - Peter A. Chew:
Critiquing Text Analysis in Social Modeling: Best Practices, Limitations, and New Frontiers. 350-358 - Kazumi Saito, Masahiro Kimura, Kouzou Ohara, Hiroshi Motoda:
Which Targets to Contact First to Maximize Influence over Social Network. 359-367 - Ofrit Lesser, Lena Tenenboim-Chekina, Lior Rokach, Yuval Elovici:
Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks. 368-376 - Lucas A. Overbey, Christopher Paribello, Terresa Jackson:
Identifying Influential Twitter Users in the 2011 Egyptian Revolution. 377-385 - Subhadeep Chakraborty:
Analytical Methods to Investigate the Effects of External Influence on Socio-Cultural Opinion Evolution. 386-393 - Biru Cui, Stephen Moskal, Haitao Du, Shanchieh Jay Yang:
Who Shall We Follow in Twitter for Cyber Vulnerability? 394-402 - Christopher M. Homan, Vincent Silenzio, Randall Sell:
Respondent-Driven Sampling in Online Social Networks. 403-411 - Yaniv Altshuler, Michael Fire, Nadav Aharony, Zeev Volkovich, Yuval Elovici, Alex Pentland:
Trade-Offs in Social and Behavioral Modeling in Mobile Networks. 412-423 - Bin Zhou, Jian Xu:
Privacy Protection in Personalized Web Search: A Peer Group-Based Approach. 424-432 - Yaniv Altshuler, Michael Fire, Erez Shmueli, Yuval Elovici, Alfred M. Bruckstein, Alex Pentland, David Lazer:
Detecting Anomalous Behaviors Using Structural Properties of Social Networks. 433-440 - Mohammad Ali Abbasi, Huan Liu:
Measuring User Credibility in Social Media. 441-448 - Jianbo Gao, Jing Hu:
Financial Crisis, Omori's Law, and Negative Entropy Flow. 449-457 - Eli Stickgold, Corey Lofdahl, Michael Farry:
Trust Metrics and Results for Social Media Analysis. 458-465
Methodology
- Peng Dai, Wanqing Yang, Shen-Shyang Ho:
Predicting Mobile Call Behavior via Subspace Methods. 466-475 - Shridhar Chandan, Sudip Saha, Christopher L. Barrett, Stephen G. Eubank, Achla Marathe, Madhav V. Marathe, Samarth Swarup, Anil Kumar S. Vullikanti:
Modeling the Interaction between Emergency Communications and Behavior in the Aftermath of a Disaster. 476-485 - Kun Hu, Christian Thoens, Simone Bianco, Stefan Edlund, Matthew A. Davis, Judith V. Douglas, James H. Kaufman:
Modeling the Dynamics of Dengue Fever. 486-494 - Rahmatollah Beheshti, Gita Sukthankar:
Improving Markov Chain Monte Carlo Estimation with Agent-Based Models. 495-502
Military Science
- Samuel H. Huddleston, Matthew S. Gerber, Donald E. Brown:
Geographic Profiling of Criminal Groups for Military Cordon and Search. 503-512 - H. Van Dyke Parunak, Sven A. Brueckner, Elizabeth Downs:
Exploiting User Model Diversity in Forecast Aggregation. 513-522 - Si Li, Ryan Rickert, Amy Sliva:
Risk-Based Models of Attacker Behavior in Cybersecurity. 523-532
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.