Trust evaluation via large-scale complex service-oriented online social networks

L Liu, H Jia - IEEE Transactions on Systems, Man, and …, 2015 - ieeexplore.ieee.org
Service-oriented online social networks (SOSNs) are emerging ubiquitous platforms for
numerous services where service consumers require the selection of trustworthy service …

Analysis and implementation of reactive fault tolerance techniques in Hadoop: a comparative study

H Asghar, B Nazir - The Journal of Supercomputing, 2021 - Springer
Hadoop is a state-of-the-art industry's de facto tool for the computation of Big Data. Native
fault tolerance procedure in Hadoop is dilatory and leads us towards performance …

Compromised account detection in online social networks: A survey

S P. Velayudhan… - … : Practice and Experience, 2019 - Wiley Online Library
Summary Online Social Networks are an integral part of the modern society. Social
networking sites are at the top rank in terms of usage out of the billions of websites hosted in …

Social agents to enable pervasive social networking services

I Alvertis, E Biliri, F Lampathaki… - Journal of theoretical and …, 2018 - SciELO Chile
Over the past decade, the way people communicate, share content and eventually conduct
business has been disrupted by social networking platforms. By bringing together pervasive …

[PDF][PDF] A-RAFF: a ranked frequent pattern-growth subgraph pattern discovery approach

SU Rehman, S Asghar - Journal of Internet Technology, 2019 - jit.ndhu.edu.tw
Graph mining is one of the arms of Data Mining in which voluminous complex data are
represented in the form of graphs and mining is done to infer useful knowledge from them …

Instant social networking with startup time minimization based on mobile cloud computing

LW Chen, YF Ho, MF Tsai - Sustainability, 2018 - mdpi.com
Mobile communication and handheld devices are currently extremely popular, and provide
people with convenient and instant platforms for social networking. However, existing social …

Fuzzy‐based fake information detection algorithm to define the user trust on the content of social networks

M Nirmala, MR Babu - IET Networks, 2019 - Wiley Online Library
Across the globe, right from people who are technologically naive to people who are with
high‐technical knowledge, use, share, spread, and connect with each other through online …

Research on Big Data: Characterizing the Field and Its Dimensions

J Akoka, I Comyn-Wattiau, N Laoufi - … AHA, CMS, EMoV, MoBID, MORE-BI …, 2015 - Springer
Big Data has emerged as a significant area of study for both practitioners and researchers.
Big Data is a term for massive data sets with large structure. In 2012, Big Data passed the …

Extended self-reproducible Discrete Event System Specification (DEVS) formalism using hidden inheritance

S Park, SM Yoo - Information Sciences, 2015 - Elsevier
In system modeling and simulation, a reproducible parent object can transfer its properties to
a child object, allowing the inherited child to represent the characteristics of its parent. In this …

[PDF][PDF] SPN-Based Performance Analysis of Multiple Users' Behaviors for SNS

Z Hong, Y Wang, M Shi - Journal of Information Hiding and …, 2022 - cdn.techscience.cn
With the rapid development of various applications of Information Technology, big data are
increasingly generated by social network services (SNS) nowadays. The designers and …