1 |
Abel F., Gao Q., Houben G. J. and Tao K., 2011, Semantic Enrichment of Twitter Posts for User Profile Construction on the Social Web, In Proceedings of Extended Semantic Web Conference 2011.
|
2 |
Abrol S., Khan L., 2010, TweetHood: Agglomerative Clustering on Fuzzy k-Closest Friends with Variable Depth for Location Mining, In Proceedings of the IEEE International Conference on Social Computing / IEEE International Conference on Privacy, Security, Risk and Trust, pp.153-160.
|
3 |
Abrol S., Khan L., 2010, TWinner: Understanding News Queries with Geo-content using Twitter, In Proceedings of the 6th Workshop on Geographic Information Retrieval, February 18-19, 2010, Zurich, Switzerland.
|
4 |
Celik I., Abel F. and Houben G. J., 2011, Learning Semantic Relationships between Entities in Twitter, In Proceedings of the 11th International Conference on Web Engineering.
|
5 |
Cheng Z., Caverlee J. and Lee K., 2010, You Are Where You Tweet: A Content-Based Approach to Geo-locating Twitter Users, In Proceedings of the 19th ACM international conference on Information and knowledge management, October 26-30, 2010, Toronto, ON, Canada, pp. 759-768.
|
6 |
Giannella C., Han I., Pei J., Yan X. and Yu P. S., 2003, Mining frequent patterns in data streams at multiple time granularities, In Kargupta H., Joshi A., Sivakumar K. and Yesha Y. (eds.), Next Generation Data Mining, AAAI/MIT.
|
7 |
Hong T. P., Lin C. W. and Wu Y. L., 2008, Incrementally fast updated frequent pattern trees, Expert Systems with Application, Vol. 34, issue 4, pp. 2424-2435.
DOI
ScienceOn
|
8 |
http://code.google.com/p/opensocial-resources/
|
9 |
http://thenextweb.com/.
|
10 |
http://twitaholic.com/.
|
11 |
http://www.w3.org/TR/owl-time/
|
12 |
https://dev.twitter.com/.
|
13 |
Kreibich C., Crowcroft J., 2004, Honeycomb: creating intrusion detection signatures using honeypots. SIGCOMM Comput. Commun. Rev., 34(1), pp. 51-56.
DOI
ScienceOn
|
14 |
Lee C. H., Wu C. H., Chien T. F., 2011, BursT: A Dynamic Term Weighting Scheme for Mining Microblogging Messages, ISNN 2011, Part III, LNCS 6677, pp. 548-557.
|
15 |
Lee K., Caverlee J. and Webb S., 2010, Uncovering Social Spammers: Social Honypots + Machine Learning, SIGIR 2010, Special Interest Group on Information Retrieval, July 19-23, 2010, Geneva, Switzerland, pp. 435-422.
|
16 |
Mathioudakis M., Koudas N., 2010, TwitterMonitor: Trend Detection over the Twitter Stream, In Proceedings of the 2010 international conference on Management of data, June 06-10, 2010, Indianapolis, Indiana, USA.
|
17 |
Perry M., Herring J., 2010, Draft of Geo-SPARQL - A geographic query language for RDF data, Open GIS Consortium.
|
18 |
Prince M. B., Dahl B. M., Holloway L., Keller A. M. and Langheinrich E., 2005, Understanding how spammers steal your e-mail address: An analysis of the first six months of data from project honey pot. In Proceedings of the Conference on Email and Anti-Spam.
|
19 |
Spitzner L., 2003, The honeynet project: Trapping the hackers. IEEE Security and Privacy, 1(2), pp. 15-23.
DOI
ScienceOn
|
20 |
안성렬, 2009, FP-tree를 이용한 점진적 연관규칙 추출 기법, 숭실대학교 대학원, 컴퓨터학과 석사학위 논문.
|
21 |
이헌규, 나동길, 최용훈, 2011, 시간 및 공간마이닝 기술을 이용한 GIS 기반의 홍보우편 시스템 개발, 한국공간정보학회지, 제19권, 제2호 pp. 65-70.
|
22 |
하수욱, 남광우, 2011, 비구조적 공간정보를 지원하는 개념적 지오시맨틱 웹 서비스 프레임워크의 설계, 한국공간정보학회지, 제19권, 제6호, pp. 91-97.
|