skip to main content
Skip header Section
Exploratory Social Network Analysis with PajekSeptember 2004
Publisher:
  • Cambridge University Press
  • 40 W. 20 St. New York, NY
  • United States
ISBN:978-0-521-60262-4
Published:01 September 2004
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Wang S, Ding B and Jin Y (2023). A Multi-Factorial Evolutionary Algorithm With Asynchronous Optimization Processes for Solving the Robust Influence Maximization Problem, IEEE Computational Intelligence Magazine, 18:3, (41-53), Online publication date: 1-Aug-2023.
  2. Mirkin B and Shalileh S (2022). Community Detection in Feature-Rich Networks Using Data Recovery Approach, Journal of Classification, 39:3, (432-462), Online publication date: 1-Nov-2022.
  3. ACM
    Blesa M, García-Rodríguez P and Serna M Forward and backward linear threshold ranks Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (265-269)
  4. Shalileh S and Mirkin B A data recovery method for community detection in feature-rich networks Proceedings of the 12th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (99-104)
  5. Jordan K (2019). Separating and Merging Professional and Personal Selves Online, Journal of the Association for Information Science and Technology, 70:8, (830-842), Online publication date: 2-Jul-2019.
  6. Liu J, Lu L and Ho M (2019). A few notes on main path analysis, Scientometrics, 119:1, (379-391), Online publication date: 1-Apr-2019.
  7. Huang K, Li P, Yang L, Yang X, Tang Y and Namin A (2019). Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach, Security and Communication Networks, 2019, Online publication date: 1-Jan-2019.
  8. Zhou X, Zhao X and Liu Y (2018). A multiobjective discrete bat algorithm for community detection in dynamic networks, Applied Intelligence, 48:9, (3081-3093), Online publication date: 1-Sep-2018.
  9. Flores-Vargas X, Vitar-Sandoval S, Gutiérrez-Maya J, Collazo-Rodríguez P and Collazo-Reyes F (2018). Determinants of the emergence of modern scientific knowledge in mineralogy (Mexico, 1975–1849): a geohistoriometric approach, Scientometrics, 115:3, (1505-1515), Online publication date: 1-Jun-2018.
  10. ACM
    Ruiz-Martin C, Wainer G and Lopez-Paredes A Formal Abstract Modeling of Dynamic Multiplex Networks Proceedings of the 2018 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation, (61-72)
  11. Hernández-Linares R, Sarkar S and Cobo M (2018). Inspecting the Achilles heel, Scientometrics, 115:2, (929-951), Online publication date: 1-May-2018.
  12. ACM
    Cheong S and Si Y (2017). Boundary Node Detection and Unfolding of Complex Non-Convex Ad Hoc Networks, ACM Transactions on Sensor Networks, 14:1, (1-34), Online publication date: 28-Feb-2018.
  13. Riquelme F, Gonzalez-Cantergiani P, Molinero X and Serna M (2018). Centrality measure in social networks based on linear threshold model, Knowledge-Based Systems, 140:C, (92-102), Online publication date: 15-Jan-2018.
  14. Moghaddam S, Ghazanfari M and Teimourpour B (2017). Social Structure Discovery Using Genetic Algorithm, International Journal of Applied Metaheuristic Computing, 8:4, (1-26), Online publication date: 1-Oct-2017.
  15. ACM
    Tarafdar P and Seetharaman P Social Movements in the Age of Social Media Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research, (109-112)
  16. ACM
    Cheong S and Si Y (2016). Accelerating the Kamada-Kawai Algorithm for Boundary Detection in a Mobile Ad Hoc Network, ACM Transactions on Sensor Networks, 13:1, (1-29), Online publication date: 28-Feb-2017.
  17. Muoz A, Delgado R, Rubio E, Grilo C and Basto-Fernandes V (2017). Forum participation plugin for Moodle, Procedia Computer Science, 121:C, (982-989), Online publication date: 1-Jan-2017.
  18. Wang C, Day M and Lin Y Toward understanding the cliques of opinion spammers with social network analysis Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (1163-1169)
  19. Tu Y and Hsu S (2016). Constructing conceptual trajectory maps to trace the development of research fields, Journal of the Association for Information Science and Technology, 67:8, (2016-2031), Online publication date: 1-Aug-2016.
  20. ACM
    Jain A and Sharma M Fuzzy and ANN based mining approach testing for Social network analysis Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, (1-7)
  21. Zamzami N and Schiffauerova A Evaluating the science-technology interaction in nanotechnology Proceedings of the 2015 Winter Simulation Conference, (242-253)
  22. ACM
    OZGUL F and ERDEM Z Deciding Resilient Criminal Networks Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (1368-1372)
  23. Yoon J (2015). The evolution of South Korea's innovation system, Scientometrics, 104:1, (265-293), Online publication date: 1-Jul-2015.
  24. Kajdanowicz T (2015). Relational Classification Using Random Walks in Graphs, New Generation Computing, 33:4, (409-424), Online publication date: 1-Jul-2015.
  25. Ge W, Hu W, He C and Zong S Emerging Pragmatic Patterns in Large-Scale RDF Data Revised Selected Papers of the Second International Conference on Cloud Computing and Big Data - Volume 9106, (247-260)
  26. Leydesdorff L, Alkemade F, Heimeriks G and Hoekstra R (2015). Patents as instruments for exploring innovation dynamics, Scientometrics, 102:1, (629-651), Online publication date: 1-Jan-2015.
  27. Kang S and Lee S (2014). Korean Online Game's Platform Competition under Two-Sided Market Characteristic, Journal of Global Information Management, 22:4, (21-33), Online publication date: 1-Oct-2014.
  28. Kim M, Jeong Y and Song M (2014). Investigating the integrated landscape of the intellectual topology of bioinformatics, Scientometrics, 101:1, (309-335), Online publication date: 1-Oct-2014.
  29. Wang Y, Li J, Ning L, Zeng D and Gu X (2014). Dynamic patterns of technology collaboration, Scientometrics, 101:1, (663-683), Online publication date: 1-Oct-2014.
  30. Meng K, Liu G, Hu Q and Li J An modularity-based overlapping community structure detecting algorithm Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (113-117)
  31. ACM
    Miltchev R, Milchev G and Manchev I Approach for integration of the methods of the network analysis in the field of distance and electronic education Proceedings of the 15th International Conference on Computer Systems and Technologies, (460-467)
  32. ACM
    Alqurashi T and Wang W A Graph based Methodology for Web Structure Mining - with a Case Study on the Webs of UK Universities Proceedings of the 4th International Conference on Web Intelligence, Mining and Semantics (WIMS14), (1-11)
  33. Ciobanu R, Reina D, Dobre C, Toral S and Johnson P (2014). JDER, Journal of Network and Computer Applications, 40:C, (279-291), Online publication date: 1-Apr-2014.
  34. ACM
    Chen Y, Qian Z, Woodbury R, Dill J and Shaw C (2014). Employing a Parametric Model for Analytic Provenance, ACM Transactions on Interactive Intelligent Systems, 4:1, (1-32), Online publication date: 1-Apr-2014.
  35. ACM
    Larraza-Mendiluze E and Garay-Vitoria N Use of concept maps to analyze students' understanding of the I/O subsystem Proceedings of the 13th Koli Calling International Conference on Computing Education Research, (67-76)
  36. Harrer A, Göhnert T and Hoppe H How Do Researchers on Collaboration Technology Collaborate with Each Other? A Social Network Analysis Proceedings of the 19th International Conference on Collaboration and Technology - Volume 8224, (26-41)
  37. Kajdanowicz T Efficient Usage of Collective Classification Algorithms for Collaborative Decision Making Proceedings of the 10th International Conference on Cooperative Design, Visualization, and Engineering - Volume 8091, (73-80)
  38. ACM
    Kajdanowicz T, Michalski R, Musial K and Kazienko P Active learning and inference method for within network classification Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (1299-1306)
  39. ACM
    Curtotti M, McCreath E and Sridharan S Software tools for the visualization of definition networks in legal contracts Proceedings of the Fourteenth International Conference on Artificial Intelligence and Law, (192-196)
  40. Liao Q, Shi L and Wang C (2013). Visual analysis of large-scale network anomalies, IBM Journal of Research and Development, 57:3-4, (13-13), Online publication date: 1-May-2013.
  41. Sosna D, Galeta P, źmejda L, Sladek V and Bruzek J (2013). Burials and Graphs, Social Science Computer Review, 31:1, (56-70), Online publication date: 1-Feb-2013.
  42. ACM
    Datta S, Sindhgatta R and Sengupta B (2012). Talk versus work, ACM SIGPLAN Notices, 47:10, (655-668), Online publication date: 15-Nov-2012.
  43. ACM
    Datta S, Sindhgatta R and Sengupta B Talk versus work Proceedings of the ACM international conference on Object oriented programming systems languages and applications, (655-668)
  44. Zhang X and Wang C (2012). Network Positions and Contributions to Online Public Goods, Journal of Management Information Systems, 29:2, (11-40), Online publication date: 1-Oct-2012.
  45. Magdaleno A, Araujo R and Werner C An exploratory study on collaboration understanding in software development social networks Proceedings of the 18th international conference on Collaboration and Technology, (113-120)
  46. Rabbany R, Takaffoli M, Fagnan J, Zaane O and Campello R Relative Validity Criteria for Community Mining Algorithms Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (258-265)
  47. ACM
    Ding Q, Katenka N, Barford P, Kolaczyk E and Crovella M Intrusion as (anti)social communication Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, (886-894)
  48. ACM
    Zhou W, Jin H and Liu Y Community discovery and profiling with social messages Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, (388-396)
  49. Lezcano L, Sánchez-Alonso S and Sicilia M (2012). Associating Clinical Archetypes Through UMLS Metathesaurus Term Clusters, Journal of Medical Systems, 36:3, (1249-1258), Online publication date: 1-Jun-2012.
  50. Antunes F and Costa J (2012). Integrating decision support and social networks, Advances in Human-Computer Interaction, 2012, (9-9), Online publication date: 1-Jan-2012.
  51. Bhavnani S, Victor S, Calhoun W, Busse W, Bleecker E, Castro M, Ju H, Pillai R, Oezguen N, Bellala G and Brasier A (2011). How cytokines co-occur across asthma patients, Journal of Biomedical Informatics, 44:S1, (S24-S30), Online publication date: 1-Dec-2011.
  52. Memon N, Wiil U, Alhajj R, Atzenbeck C and Harkiolakis N (2011). Harvesting covert networks: a case study of the iMiner database, International Journal of Networking and Virtual Organisations, 8:1/2, (52-74), Online publication date: 1-Nov-2011.
  53. ACM
    Sindhgatta R, Sengupta B and Datta S Coping with distance Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion, (155-162)
  54. Grcar M and Lavrac N A methodology for mining document-enriched heterogeneous information networks Proceedings of the 14th international conference on Discovery science, (107-121)
  55. Ding H and Rigby J An investigation on the relationship between informal networks and organizational performance Proceedings of the 4th international conference on Internationalization, design and global development, (490-493)
  56. ACM
    Sureka A, Goyal A and Rastogi A Using social network analysis for mining collaboration data in a defect tracking system for risk and vulnerability analysis Proceedings of the 4th India Software Engineering Conference, (195-204)
  57. ACM
    Durant K, McCray A and Safran C Modeling the temporal evolution of an online cancer forum Proceedings of the 1st ACM International Health Informatics Symposium, (356-365)
  58. ACM
    Catanese S and Fiumara G A visual tool for forensic analysis of mobile phone traffic Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, (71-76)
  59. Magdaleno A, Werner C and De Araujo R Analyzing collaboration in software development processes through social networks Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part I, (435-446)
  60. Merlo E, Ríos, S, Álvarez H, L'Huillier G and Velásquez J Finding inner copy communities using social network analysis Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part II, (581-590)
  61. Safar M, Farahat H and Mahdi K (2010). Robustness of dynamic social networks, Journal of Mobile Multimedia, 6:3, (243-262), Online publication date: 1-Sep-2010.
  62. Erman N and Todorovski L Analyzing the structure of the EGOV conference community Proceedings of the 9th IFIP WG 8.5 international conference on Electronic government, (73-84)
  63. Graham T The use of expressives in online political talk Proceedings of the 2nd IFIP WG 8.5 international conference on Electronic participation, (26-41)
  64. Bezerianos A, Chevalier F, Dragicevic P, Elmqvist N and Fekete J Graphdice Proceedings of the 12th Eurographics / IEEE - VGTC conference on Visualization, (863-872)
  65. Zacarias M, Pinto H, Magalhães R and Tribolet J (2010). A 'context-aware' and agent-centric perspective for the alignment between individuals and organizations, Information Systems, 35:4, (441-466), Online publication date: 1-Jun-2010.
  66. ACM
    Safar M, Farahat H and Mahdi K Analysis of dynamic social network Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, (41-48)
  67. Mahdi K, Safar M and Farahat H (2009). Analysis of temporal evolution of social networks, Journal of Mobile Multimedia, 5:4, (333-350), Online publication date: 1-Dec-2009.
  68. Gao J, Misue K and Tanaka J A Multiple-Aspects Visualization Tool for Exploring Social Networks Proceedings of the Symposium on Human Interface 2009 on Human Interface and the Management of Information. Information and Interaction. Part II: Held as part of HCI International 2009, (277-286)
  69. ACM
    Smith M, Shneiderman B, Milic-Frayling N, Mendes Rodrigues E, Barash V, Dunne C, Capone T, Perer A and Gleave E Analyzing (social media) networks with NodeXL Proceedings of the fourth international conference on Communities and technologies, (255-264)
  70. San Martín M and Gutierrez C Representing, Querying and Transforming Social Networks with RDF/SPARQL Proceedings of the 6th European Semantic Web Conference on The Semantic Web: Research and Applications, (293-307)
  71. Erman N Citation analysis for e-government research Proceedings of the 10th Annual International Conference on Digital Government Research: Social Networks: Making Connections between Citizens, Data and Government, (244-253)
  72. ACM
    Jesi G, Mollona E, Nair S and van Steen M Prestige-based peer sampling service Proceedings of the 2009 ACM symposium on Applied Computing, (1209-1213)
  73. Ortega J and Aguillo I (2009). Mapping world-class universities on the web, Information Processing and Management: an International Journal, 45:2, (272-279), Online publication date: 1-Mar-2009.
  74. MacArthur B, Sánchez-García R and Anderson J (2008). Symmetry in complex networks, Discrete Applied Mathematics, 156:18, (3525-3531), Online publication date: 1-Nov-2008.
  75. ACM
    Strohmaier M Purpose tagging Proceedings of the 2008 ACM workshop on Search in social media, (35-42)
  76. ACM
    Harrer A, Moskaliuk J, Kimmerle J and Cress U Visualizing wiki-supported knowledge building Proceedings of the 4th International Symposium on Wikis, (1-9)
  77. ACM
    Yen L, Saerens M, Mantrach A and Shimbo M A family of dissimilarity measures between nodes generalizing both the shortest-path and the commute-time distances Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, (785-793)
  78. Ortega J and Aguillo I (2008). Visualization of the Nordic academic web, Information Processing and Management: an International Journal, 44:4, (1624-1633), Online publication date: 1-Jul-2008.
  79. Ozgul F, Erdem Z and Aksoy H Comparing Two Models for Terrorist Group Detection Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics, (149-160)
  80. ACM
    Perer A and Shneiderman B Integrating statistics and visualization Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (265-274)
  81. ACM
    Perer A and Shneiderman B Systematic yet flexible discovery Proceedings of the 13th international conference on Intelligent user interfaces, (109-118)
  82. Yeung C, Gibbins N and Shadbolt N Understanding the semantics of ambiguous tags in folksonomies Proceedings of the First International Conference on Emergent Semantics and Ontology Evolution, (108-121)
  83. Yeung C, Gibbins N and Shadbolt N Tag Meaning Disambiguation through Analysis of Tripartite Structure of Folksonomies Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Workshops, (3-6)
  84. Henry N, Fekete J and McGuffin M (2007). NodeTrix, IEEE Transactions on Visualization and Computer Graphics, 13:6, (1302-1309), Online publication date: 1-Nov-2007.
  85. Grcar M, Grobelnik M and Mladenic D Using text mining and link analysis for software mining Proceedings of the 3rd ECML/PKDD international conference on Mining complex data, (1-12)
  86. Grcar M, Grobelnik M and Mladenic D Using text mining and link analysis for software mining Proceedings of the Third International Conference on Mining Complex Data, (1-12)
  87. Cocciolo A, Chae H and Natriello G Using social network analysis to highlight an emerging online community of practice Proceedings of the 8th iternational conference on Computer supported collaborative learning, (148-152)
  88. Perer A and Shneiderman B (2006). Balancing Systematic and Flexible Exploration of Social Networks, IEEE Transactions on Visualization and Computer Graphics, 12:5, (693-700), Online publication date: 1-Sep-2006.
  89. ACM
    Chin A and Chignell M A social hypertext model for finding community in blogs Proceedings of the seventeenth conference on Hypertext and hypermedia, (11-22)
  90. ACM
    Petricek V, Escher T, Cox I and Margetts H The web structure of e-government - developing a methodology for quantitative evaluation Proceedings of the 15th international conference on World Wide Web, (669-678)
  91. ACM
    Alt C, Astrachan O, Forbes J, Lucic R and Rodger S (2006). Social networks generate interest in computer science, ACM SIGCSE Bulletin, 38:1, (438-442), Online publication date: 31-Mar-2006.
  92. ACM
    Alt C, Astrachan O, Forbes J, Lucic R and Rodger S Social networks generate interest in computer science Proceedings of the 37th SIGCSE technical symposium on Computer science education, (438-442)
  93. Wu Y and Takatsuka M Visualizing multivariate network on the surface of a sphere Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation - Volume 60, (77-83)
  94. Wang C, Day M and Lin Y A Real Case Analytics on Social Network of Opinion Spammers 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI), (623-630)
Contributors
  • HSE University

Recommendations

Reviews

Claudia Roda

Social network analysis has recently been applied to fields as diverse as history, biology, business administration, medicine, and political science. In recent years, several software tools (see Huisman and van Duijn [1] for a review) have been developed to support the many network analytic techniques that form the growing body of work that makes up the methodological foundations of social networks theory. The authors of this new book guide their readers through a well-selected and clearly organized set of topics and techniques necessary for an understanding of the relationships between and among, for example, individuals, organizations, or nation states. Concepts are always explained in the context of real-world examples, and the theory is integrated with applications using the software package Pajek. While the book does not seek to provide a complete and thorough overview of all issues and techniques in social network analysis, or an inclusive guide to the Pajek software, it addresses what the authors indicate to be the "three major research topics in social network analysis": cohesion, brokerage, and ranking. Block modeling is also examined as "an advanced technique [that] integrates the three research topics." Compared to other books frequently used to introduce social network analysis [2,3], this book places much more emphasis on applications, and presents all concepts without using mathematical notations. In this sense, it is ideal as an introduction to the subject for a wide audience, which may not be interested in mathematical properties, or in developing algorithms (if you are interested in these latter aspects, Wasserman and Faust's book [3] may be more suitable). Notwithstanding the lack of formal notation, rigor in the introduction of concepts is skillfully maintained by supplying precise verbatim definitions. The glossary supplied at the end of the book is also rigorous and helpful. While hypothesis testing falls completely outside the book's scope, its focus is on network exploration through techniques for network manipulation and visualization, and the software used is well suited for this purpose. The authors have made an effort to explicitly render some of the assumptions underlying the models used, as well as most of the assumptions underlying the manipulation techniques. One of the strengths of this book is its smooth integration of theory presentation and instructions for the use of related functions in Pajek (opening the way for a more in-depth and personalized exploration of the various concepts). However, the sections describing the software are well separated from the coverage of theory and the examples, so an uninterested reader could skip them. The bibliography, although not extensive, is adequate. Further readings are placed at the end of each chapter, but references are not generally given in the main text, which makes it harder for the reader to connect to existing literature while reading. The three appendices ("Getting Started with Pajek," "Exporting Visualizations," and "Shortcut Key Combinations"), together with the "Index of Pajek Commands," supply the essential reference material to work with Pajek. Overall, the book reads very well, and introduces important and sometimes complex concepts in a very clear manner. By analyzing real-world examples and discussing the advantages and limitations of the various techniques, the book stimulates the reader's curiosity and provides incentive for reflection. It also supplies the essential tools for further applications of social network analysis. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.