Please wait a minute...
New Technology of Library and Information Service  2010, Vol. 26 Issue (2): 68-73    DOI: 10.11925/infotech.1003-3513.2010.02.12
article Current Issue | Archive | Adv Search |
Research Summary on the Key Technologies of Social Network Search
Du Yiming   Teng Guifa   Ma Jianbin
(College of Information Science and Technology, Agricultural University of Hebei, Baoding 071001,China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

This paper reviews the research of social network search in recent years, then analyses and compares the key technologies systematically in the aspects of social relations extraction, social networking visualization and social relationship search.It also proposes a method which can weight the relationship. Finally, some future directions are pointed out.

Key wordsSocial network search      Social relations extraction      Social network visualization      Social relationships search     
Received: 31 January 2010      Published: 25 February 2010
: 

G353

 
Corresponding Authors: Du Yiming     E-mail: 1.baidu@163.com
About author:: Du Yiming,Teng Guifa,Ma Jianbin

Cite this article:

Du Yiming,Teng Guifa,Ma Jianbin. Research Summary on the Key Technologies of Social Network Search. New Technology of Library and Information Service, 2010, 26(2): 68-73.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2010.02.12     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2010/V26/I2/68

[1] Milgram S. Behavioral Study of Obedience[J].Journal of Abnormal and Social Psychology,1963,67 (4):371-378.
[2] Dunbar R. Cambridge Mass[M].Harvard University Press,1996.
[3] Staab S, Domingos P, Mika P, et al. Social Networks Applied[J]. IEEE Intelligent Systems,2005,20(1):80-93.
[4] Spertus E, Sahami M,Buyukkokten O. Evaluating Similarity Measures: A Large-scale Study in the Orkut Social Network[C]. In:Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining.2005:678-684.
[5] Yutaka Matsuo,Masahiro Hamasaki,Yoshiyuki Nakamura, et al. Spinning Multiple Social Networks for Semantic Web[C]. In: Proceedings of the 21st National Conference on Artificial Intelligence, Boston, Massachusetts. AAAI Press,2006:1381-1386 .
[6] Adamic L A, Buyukkokten O,Adar E. A Social Network Caught in the Web[EB/OL].[2010-01-20].http://www.cond.org/social.pdf.
[7] Kautz H, Selman B,Shah M. The Hidden Web[J]. AI Magazine,1997,18(2):27-35.
[8] Mika P.Flink: Semantic Web Technology for the Extraction and Analysis of Social Network [J]. Journal of Web Semantics,2005,3(2):211-223.
[9] Yutaka Matsuo,Junichiro Mori,Takuichi Nishimura,et al.POLYPHONET: An Advanced Social Network Extraction System from Web[J]. Web Semantics: Science, Services and Agents on the World Wide Web,2006,5(4):262-278.
[10]邸楠,姚从磊,李晓明. 基于中文Web社会网络的提取、测量与分析[J]. 广西师范大学学报:自然科学版,2007,25(2):169-172.
[11] Agichtein E,Gravano L. Snowball: Extracting Relations from Large Plain-Text Collections[C]. In: Proceedings of the 5th ACM Conference on Digital Libraries,San Antonio, Texas, USA. 2000:85-94.
[12] Newman M E J. Who is the Best Connected Scientist? A Study of Scientific Coauthorship Networks[J] Physical Review E,2001,64 (1): 016131.
[13]Barabási A L, Jeong H,Néda Z,et al. Evolution of the Social Network of Scientific Collaborations[EB/OL].[2010-01-20].http://arxiv.org/PS_cache/cond-mat/pdf/0104/0104162v1.pdf.
[14] Frantz T L,Carley K M. Transforming Raw-Email Data into Social-network Information[C]. In:Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO International Workshops on Intelligence and Security Informatics,Taipei, Taiwan. 2008:413-420.
[15] Stolfo S J, Hershkop S, Wang K, et al.A Behavior-based Approach to Securing Email Systems [EB/OL].[2010-01-20]. http://sneakers.cs.columbia.edu/ids/publications/EMT-ACNS03.pdf.
[16]郭绍忠,段丹,刘晓楠,等.邮件挖掘技术在社会网络分析中的研究与应用[J]. 计算机工程与设计,2008, 29(9):2339-2341.
[17]高鹏,曹先彬. 基于社会网络的聊天数据噪声过滤[J]. 计算机工程,2008,34(5):166-168.
[18]尹洪章,曹先彬. 结合内容相似性和时序性的社会网络挖掘[J]. 计算机工程,2008,34(1): 83-85.
[19]于静,赵燕平. 基于社会网络分析的BBS内容安全动态检测模型[C].见:第二届全国信息搜索与内容安全学术会议论文集.2005:319-328.
[20]Freeman L C. Visualizing Social Networks[EB/OL].[2010-01-20].http://a.parsons.edu/~torres/thesis/links/docs/Visualizing_Social_Networks.pdf.
[21]Heer J,Boyd D. Vizster: Visualizing Online Social Networks[C]. In:Proceedings of the 2005 IEEE Symposium on Information Visualization,Minneapolis, Minnesota, USA.2005.
[22]Neviarouskaya A, Prendinger H,Ishizuka M. Analysis of Affect Expressed Through the Evolving Language of Online Communication[EB/OL].[2009-02-15]. http://www.miv.t.u-tokyo.ac.jp/papers/alena-IUI07.pdf.
[23] A Thematic Inhabited Information Space with "Intelligent" Communication Services[EB/OL].[2009-02-15]. http://www.dfki.de/imedia/mlounge/.
[24]Schmitt M,Rist T. Avatar Arena: Virtual Group-dynamics in Multicharacter Negotiation Scenarios[C]. In:Proceedings of Intelligent Virtual Agents Kloster Irsee, Germany.2003.
[25]Kim S M,Hovy E H. Identifying and Analyzing Judgment Opinions[C]. In:Proceedings of the Human Language Technology / North American Association of Computational Linguistics Conference,New York.2006.
[26]Kwon N, Shulman S, Hovy E H. Multidimensional Text Analysis for eRulemaking[C]. In:Proceedings of the National Conference on Digital Government,San Diego, CA, USA.2006.
[27]Barnes J, Hut P. A Hierarchical O(N log N) Force Calculation Algorithm[EB/OL].[2010-01-20].http://physics.ucsd.edu/students/courses/winter2006/physics141/lecture16/2002JCP ...179...27D.pdf.
[28] Pittinger R.Linkbar and Forensik: Two Systems for Interactive Visualization of Online Social Networks[EB/OL].[2010-01-20]. http://www.pi-werk.de/projects/interactive/linkbar+forensik.pdf.
[29] Davis I, Jr Vitiello E. RELATIONSHIP: A Vocabulary for Describing Relationships Between People[EB/OL].[2009-12-30].http://vocab.org/relationship/.

 

[1] Zhang Jinzhu. Influential Spreaders in Co-author Network Based on K-shell[J]. 现代图书情报技术, 2012, 28(5): 65-69.
[2] Xu Xin, Yu Fei, Zhang Li. A Method and Its Application of Text Semantic Orientation[J]. 现代图书情报技术, 2011, 27(10): 54-62.
[3] Cao Mei. Research on Key Behaviors of Image Retrieval on Internet[J]. 现代图书情报技术, 2010, 26(12): 40-45.
[4] Yang Yuan, Gao Liubin. A Tentative Study of Disjoint Literature Discovery Based on Transitive Closure ——Take Cancer Drug Target for Example[J]. 现代图书情报技术, 2010, 26(12): 52-57.
[5] Xiong Xia Chang Chun Wu Wenna. The Design and Implementation of Loop Error Checking Algorithm for Hierarchical Relationship[J]. 现代图书情报技术, 2010, 26(5): 18-22.
[6] Cao Mei,Zhu Xuefang. Research Progress on User Image Descriptions[J]. 现代图书情报技术, 2009, 25(12): 31-36.
[7] Chen Yijia,Zhao Xing. Study on knowledge Communication of International Information &|Library Science: A Perspective of Journal Citation Networks[J]. 现代图书情报技术, 2009, 25(6): 55-60.
[8] Yang Bijia,Zhang Xu. The Application of Patent’s Network Analysis in Technology Roadmap[J]. 现代图书情报技术, 2008, 24(5): 61-66.
[9] Zhao Dongxia,Zhao Xinli. Study About Government Ontology Construction Based on the E-government Thesauri[J]. 现代图书情报技术, 2008, 24(3): 73-77.
[10] Zhang Junli,Gao Jinsong,Zhang Fan. Comparative Study of Foreign Search Engines Based on Grid Technology[J]. 现代图书情报技术, 2007, 2(9): 28-33.
[11] Zhang Shaolong,Zhou Ning,Wu Jiaxin . The Construction of Patent-Citation Analysis Visualization System -Case Study of USPTO[J]. 现代图书情报技术, 2007, 2(2): 64-66.
[12] Zhang Shaolong,Wu Jiaxin . Storing and Using of DC Metadata Based on NXD Database[J]. 现代图书情报技术, 2006, 1(12): 9-11.
[13] Hou Ya’nan. Function Design and Realization of Individual Service System——Practice of Individual Service in TEDA Library[J]. 现代图书情报技术, 2005, 21(3): 16-19.
[14] Jiao Yuying,Yu Caixia. A Study on the Enterprise’s Information Literacy and Its Evaluation Methods[J]. 现代图书情报技术, 2005, 21(3): 70-76.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn