Call For Papers:
1st International Workshop on Information Analysis and Data Mining Over Social Network (DMSN-ICDM 2015)
In recent years, the research on social networks has advanced significantly, which can be attributed to the prevalence of the online social websites and instant messaging systems. Social networks have become the key platforms for, among others, content dissemination, professional networking, recommendation, alerting, and political campaigns. Providing support for social network analysis, such as tracing, propagation, visualization or simulation, new computational approaches focus on representing, analyzing, and extracting useful patterns from them. The availability of huge network-structured data, such as social, citation, mobile, terrorism and metabolic networks, provides great opportunities to understand complex systems of social networks. This workshop aims at identifying challenges on social networks, especially on information analysis and data mining over social networks. The research along this direction is also very promising for businesses and IT industry, as they develop innovative ideas fostering the design of the new generation of social network platforms and their services.
This workshop aims at bringing together researchers and professionals from academia and industry from around the world for showcasing, discussing, and reviewing the whole spectrum of technological opportunities, challenges, solutions, and emerging applications in social network information analysis and data mining. We especially encourage original work based on interdisciplinary research, such as computer science and social science, where quantitative evidence is available demonstrating the mutual advantage of such an approach.
Topics of particular interest (but not limited to):
Community structure analysis and detection in social networks;
Evolution and dynamics of social networks;
Applications of social network and media analysis and mining;
Propagation and diffusion of information in social networks;
Modeling and analysis of multidimensional, multimode, and temporal networks;
Anomaly detection in social networks;
Link prediction in social networks;
Privacy and security in social networks;
Collective behavior analysis in social networks
Data mining and machine learning to gain novel insights on social networks
Deep learning for analysis in social networks
Data mining on dynamic, heterogeneous and large-scale behavior analysis
Real-world applications of social networks
Timeline
Due date for full workshop papers: July 20, 2015
Notification of workshop papers acceptance to authors: September 1, 2015
Camera-ready deadline for accepted papers: September 10, 2015 (tentatively)
Workshop dates: November 14, 2015
*All deadlines are at 11:59PM Pacific Daylight Time.
Submission Link
https://wi-lab.com/cyberchair/2015/icdm15/scripts/submit.php?subarea=S21&undisplay_detail=1&wh=/cyberchair/2015/icdm15/scripts/ws_submit.php
SUBMISSION GUIDELINES
Camera-ready paper format for Triple Blind Submission and Review
Your final papers MUST be formatted to IEEE Computer Society Proceedings Manuscript Formatting Guidelines. It is highly recommended that you proofread and check the layout of your paper BEFORE submitting it to PDF eXpress.
Submissions should not exceed 10 pages.
Formatting instructions and document templates for camera-ready submission
LaTeX and Word document templates
You can also refer to http://www.ieee.org/conferences_events/conferences/publishing/templates.html
Triple blind submission guidelines
Since 2011, ICDM has imposed a triple blind submission and review policy for all submissions. Authors must hence not use identifying information in the text of the paper and bibliographies must be referenced to preserve anonymity. The following sections give further information for authors.
What is triple blind reviewing?
The traditional blind paper submission hides the referee name from the authors. The triple-blind paper submission and review, in addition, also hides the authors names from the referees, and the referees' names during discussion. The names of authors and referees remain known only to the PC co-chairs, and the authors names are disclosed only after the ranking and acceptance of submissions are finalized. Although there is much debate on the merits and perceived benefits of triple blind reviewing, these are not discussed here. Our main purpose is to implement this policy in ICDM toward understanding the influence of the authors' identity, whether conscious or unconscious, on the reviewer's attitude toward a submission. Hence it is imperative that all authors of ICDM submissions work on concealing their identity in the content of the paper. It does not suffice to simply remove the authors' names from the first page.
How to prepare your submissions
The authors shall omit their names from the submission.
In the submission, the authors' should refer to their own prior work like the prior work of any other author, and include all relevant citations. This can be done either by referring to their prior work in the third person or referencing papers generically. For example, if your name is Smith and you have worked on clustering, instead of saying "We extend our earlier work on distance-based clustering (Smith 2005)," you might say "We extend Smith's (Smith 2005) earlier work on distance-based clustering."
The authors shall exclude citations to their own work which is not fundamental to understanding the paper, including prior versions (e.g., technical reports, unpublished internal documents) of the submitted paper. They should reference only necessary work using point (2). Hence, do not write: "In our previous work [3]" as it reveals that citation 3 is written by the current authors.
The authors shall remove mention of funding sources, personal acknowledgments, and other such auxiliary information that could be related to their identities. These can be reinstituted in the camera-ready copy once the paper is accepted for publication.
The authors shall make statements on well-known or unique systems that identify an author, as vague in respect to identifying the authors as possible.
The submitted files shall be named with care to ensure that authors' anonymity is not compromised by the file name. E.g., do not name your submission "<YourFirstName>.pdf", instead give it a name that is descriptive of the title of your paper, such as "ANewApproachtoClustering.pdf" (or a shorter version of the same).