Please wait a minute...
Advanced Search
现代图书情报技术  2010, Vol. 26 Issue (2): 68-73     https://doi.org/10.11925/infotech.1003-3513.2010.02.12
  情报分析与研究 本期目录 | 过刊浏览 | 高级检索 |
社会网络搜索关键技术研究概述
杜一鸣  滕桂法  马建斌
(河北农业大学信息科学与技术学院  保定 071001)
Research Summary on the Key Technologies of Social Network Search
Du Yiming   Teng Guifa   Ma Jianbin
(College of Information Science and Technology, Agricultural University of Hebei, Baoding 071001,China)
全文: PDF (903 KB)   HTML  
输出: BibTeX | EndNote (RIS)      
摘要 

在介绍近年来社会网络搜索总体研究情况的基础上,从社会关系获取、社会网络可视化及社会关系搜索三个方面,较为系统地分析和比较实现这三部分的关键技术,并提出一种对人际关系进行数值化处理的思路,指出进一步的研究方向。

服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
杜一鸣
滕桂法
关键词 社会网络搜索社会关系获取社会网络可视化社会关系搜索    
Abstract

This paper reviews the research of social network search in recent years, then analyses and compares the key technologies systematically in the aspects of social relations extraction, social networking visualization and social relationship search.It also proposes a method which can weight the relationship. Finally, some future directions are pointed out.

Key wordsSocial network search    Social relations extraction    Social network visualization    Social relationships search
收稿日期: 2010-01-31      出版日期: 2010-02-25
: 

G353

 
通讯作者: 杜一鸣     E-mail: 1.baidu@163.com
作者简介: 杜一鸣,滕桂法,马建斌
引用本文:   
杜一鸣,滕桂法,马建斌. 社会网络搜索关键技术研究概述[J]. 现代图书情报技术, 2010, 26(2): 68-73.
Du Yiming,Teng Guifa,Ma Jianbin. Research Summary on the Key Technologies of Social Network Search. New Technology of Library and Information Service, 2010, 26(2): 68-73.
链接本文:  
https://manu44.magtech.com.cn/Jwk_infotech_wk3/CN/10.11925/infotech.1003-3513.2010.02.12      或      https://manu44.magtech.com.cn/Jwk_infotech_wk3/CN/Y2010/V26/I2/68

[1] Milgram S. Behavioral Study of Obedience[J].Journal of Abnormal and Social Psychology,1963,67 (4):371-378.
[2] Dunbar R. Cambridge Mass[M].Harvard University Press,1996.
[3] Staab S, Domingos P, Mika P, et al. Social Networks Applied[J]. IEEE Intelligent Systems,2005,20(1):80-93.
[4] Spertus E, Sahami M,Buyukkokten O. Evaluating Similarity Measures: A Large-scale Study in the Orkut Social Network[C]. In:Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining.2005:678-684.
[5] Yutaka Matsuo,Masahiro Hamasaki,Yoshiyuki Nakamura, et al. Spinning Multiple Social Networks for Semantic Web[C]. In: Proceedings of the 21st National Conference on Artificial Intelligence, Boston, Massachusetts. AAAI Press,2006:1381-1386 .
[6] Adamic L A, Buyukkokten O,Adar E. A Social Network Caught in the Web[EB/OL].[2010-01-20].http://www.cond.org/social.pdf.
[7] Kautz H, Selman B,Shah M. The Hidden Web[J]. AI Magazine,1997,18(2):27-35.
[8] Mika P.Flink: Semantic Web Technology for the Extraction and Analysis of Social Network [J]. Journal of Web Semantics,2005,3(2):211-223.
[9] Yutaka Matsuo,Junichiro Mori,Takuichi Nishimura,et al.POLYPHONET: An Advanced Social Network Extraction System from Web[J]. Web Semantics: Science, Services and Agents on the World Wide Web,2006,5(4):262-278.
[10]邸楠,姚从磊,李晓明. 基于中文Web社会网络的提取、测量与分析[J]. 广西师范大学学报:自然科学版,2007,25(2):169-172.
[11] Agichtein E,Gravano L. Snowball: Extracting Relations from Large Plain-Text Collections[C]. In: Proceedings of the 5th ACM Conference on Digital Libraries,San Antonio, Texas, USA. 2000:85-94.
[12] Newman M E J. Who is the Best Connected Scientist? A Study of Scientific Coauthorship Networks[J] Physical Review E,2001,64 (1): 016131.
[13]Barabási A L, Jeong H,Néda Z,et al. Evolution of the Social Network of Scientific Collaborations[EB/OL].[2010-01-20].http://arxiv.org/PS_cache/cond-mat/pdf/0104/0104162v1.pdf.
[14] Frantz T L,Carley K M. Transforming Raw-Email Data into Social-network Information[C]. In:Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO International Workshops on Intelligence and Security Informatics,Taipei, Taiwan. 2008:413-420.
[15] Stolfo S J, Hershkop S, Wang K, et al.A Behavior-based Approach to Securing Email Systems [EB/OL].[2010-01-20]. http://sneakers.cs.columbia.edu/ids/publications/EMT-ACNS03.pdf.
[16]郭绍忠,段丹,刘晓楠,等.邮件挖掘技术在社会网络分析中的研究与应用[J]. 计算机工程与设计,2008, 29(9):2339-2341.
[17]高鹏,曹先彬. 基于社会网络的聊天数据噪声过滤[J]. 计算机工程,2008,34(5):166-168.
[18]尹洪章,曹先彬. 结合内容相似性和时序性的社会网络挖掘[J]. 计算机工程,2008,34(1): 83-85.
[19]于静,赵燕平. 基于社会网络分析的BBS内容安全动态检测模型[C].见:第二届全国信息搜索与内容安全学术会议论文集.2005:319-328.
[20]Freeman L C. Visualizing Social Networks[EB/OL].[2010-01-20].http://a.parsons.edu/~torres/thesis/links/docs/Visualizing_Social_Networks.pdf.
[21]Heer J,Boyd D. Vizster: Visualizing Online Social Networks[C]. In:Proceedings of the 2005 IEEE Symposium on Information Visualization,Minneapolis, Minnesota, USA.2005.
[22]Neviarouskaya A, Prendinger H,Ishizuka M. Analysis of Affect Expressed Through the Evolving Language of Online Communication[EB/OL].[2009-02-15]. http://www.miv.t.u-tokyo.ac.jp/papers/alena-IUI07.pdf.
[23] A Thematic Inhabited Information Space with "Intelligent" Communication Services[EB/OL].[2009-02-15]. http://www.dfki.de/imedia/mlounge/.
[24]Schmitt M,Rist T. Avatar Arena: Virtual Group-dynamics in Multicharacter Negotiation Scenarios[C]. In:Proceedings of Intelligent Virtual Agents Kloster Irsee, Germany.2003.
[25]Kim S M,Hovy E H. Identifying and Analyzing Judgment Opinions[C]. In:Proceedings of the Human Language Technology / North American Association of Computational Linguistics Conference,New York.2006.
[26]Kwon N, Shulman S, Hovy E H. Multidimensional Text Analysis for eRulemaking[C]. In:Proceedings of the National Conference on Digital Government,San Diego, CA, USA.2006.
[27]Barnes J, Hut P. A Hierarchical O(N log N) Force Calculation Algorithm[EB/OL].[2010-01-20].http://physics.ucsd.edu/students/courses/winter2006/physics141/lecture16/2002JCP ...179...27D.pdf.
[28] Pittinger R.Linkbar and Forensik: Two Systems for Interactive Visualization of Online Social Networks[EB/OL].[2010-01-20]. http://www.pi-werk.de/projects/interactive/linkbar+forensik.pdf.
[29] Davis I, Jr Vitiello E. RELATIONSHIP: A Vocabulary for Describing Relationships Between People[EB/OL].[2009-12-30].http://vocab.org/relationship/.

 

[1] 张金柱. 利用K-shell分析合著网络中的作者传播影响力[J]. 现代图书情报技术, 2012, 28(5): 65-69.
[2] 许鑫, 俞飞, 张莉. 一种文本倾向性分析方法及其应用[J]. 现代图书情报技术, 2011, 27(10): 54-62.
[3] 曹梅. 网络图像检索的关键行为研究[J]. 现代图书情报技术, 2010, 26(12): 40-45.
[4] 杨渊, 高柳滨. 基于传递闭包方法的非相关文献知识发现探索——以癌药物靶点为例[J]. 现代图书情报技术, 2010, 26(12): 52-57.
[5] 熊霞 常春 吴雯娜. 等级关系循环错误检查算法的设计与实现*[J]. 现代图书情报技术, 2010, 26(5): 18-22.
[6] 曹梅,朱学芳. 图像检索需求描述的研究进展*[J]. 现代图书情报技术, 2009, 25(12): 31-36.
[7] 陈亦佳,赵星. 基于期刊引文网络视角研究国际图书馆学情报学知识交流[J]. 现代图书情报技术, 2009, 25(6): 55-60.
[8] 杨璧嘉,张旭. 专利网络分析在技术路线图中的应用[J]. 现代图书情报技术, 2008, 24(5): 61-66.
[9] 赵东霞,赵新力. 基于政务主题词表的本体构建研究*[J]. 现代图书情报技术, 2008, 24(3): 73-77.
[10] 张俊丽,高劲松,张帆. 基于网格的国外搜索引擎系统的比较研究*[J]. 现代图书情报技术, 2007, 2(9): 28-33.
[11] 张少龙,周宁,吴佳鑫 . 专利文献引用关联可视化系统的构建-以“美国专利数据库 ( USPTO )检索系统”为例[J]. 现代图书情报技术, 2007, 2(2): 64-66.
[12] 张少龙,吴佳鑫 . 基于NXD数据库的DC元数据存储和使用[J]. 现代图书情报技术, 2006, 1(12): 9-11.
[13] 侯雅楠. 个性化服务系统功能设计与实现——泰达图书馆个性化服务的实践[J]. 现代图书情报技术, 2005, 21(3): 16-19.
[14] 焦玉英,余彩霞. 企业信息能力及其评价方法研究[J]. 现代图书情报技术, 2005, 21(3): 70-76.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
版权所有 © 2015 《数据分析与知识发现》编辑部
地址:北京市海淀区中关村北四环西路33号 邮编:100190
电话/传真:(010)82626611-6626,82624938
E-mail:jishu@mail.las.ac.cn