We are pleased to welcome you to the First Workshop on Online Social Networks (WOSN 2008). With half a billion active users, online social networks have attained critical mass and triggered intense research interest in collaborative systems and the analysis of the structure and properties of online communities.
In creating WOSN 2008, we had one overarching goal in mind: To bring together researchers and practitioners across various disciplines in order to discuss the challenges and the important questions posed by the emerging online social applications, and advance the state of the art in our understanding of social networks. We believe that the WOSN 2008 program realizes this goal to a large extent by covering several aspects of online social networks, including those of network and system architecture design that are of natural interest to the SIGCOMM community.
In this first workshop on online social networks, we received a total of 40 submissions from universities, academic institutions and the industry. All papers went through a rigorous reviewing process with the majority of papers receiving 3 or more reviews by TPC members and external reviewers. Reviewing was followed by email discussion of controversial papers. Of the 40 papers submitted, a total of 14 were accepted for publication.
Specifically, the workshop program consists of four sessions. The first session of WOSN 2008 is concerned with the impact of social networks on voting, advertising and the flow of information within the social graph. The "face of social networks" is portrayed in the second session of the workshop, where a series of characterization papers examine different properties of online social networks, ranging from structural properties of the social graph to user privacy concerns and user behaviors as these are observed in the online social applications. The third session, titled "who do you trust?", explores efficient system design and architectures for sharing content in online social networks. Mobile social networks and social mobility is the subject of the fourth session, where algorithms for opportunistic gossiping and characteristics of human mobility are presented.
Proceeding Downloads
Do social networks improve e-commerce?: a study on social marketplaces
Social networks have made a significant impact on how Internet users communicate, search for and share data today. Numerous proposals have been made to improve existing distributed systems by leveraging the inherent trust built into social links. For ...
Analysis of social voting patterns on digg
The social Web is transforming the way information is created and distributed. Blog authoring tools enable users to publish content, while sites such as Digg and Del.icio.us are used to distribute content to a wider audience. With content fast becoming ...
Characterizing social cascades in flickr
Online social networking sites like MySpace and Flickr have become a popular way to share and disseminate content. Their massive popularity has led to the viral marketing of content, products, and political campaigns on the sites themselves. Despite the ...
A few chirps about twitter
Web 2.0 has brought about several new applications that have enabled arbitrary subsets of users to communicate with each other on a social basis. Such communication increasingly happens not just on Facebook and MySpace but on several smaller network ...
Growth of the flickr social network
Online social networking sites like MySpace, Orkut, and Flickr are among the most popular sites on the Web and continue to experience dramatic growth in their user population. The popularity of these sites offers a unique opportunity to study the ...
Poking facebook: characterization of osn applications
Facebook is one of the most popular Internet sites today. A key feature that arguably contributed to Facebook's unprecedented success is its application platform, which enables the development of third-party social-networking applications. Understanding ...
Characterizing privacy in online social networks
Online social networks (OSNs) with half a billion users have dramatically raised concerns on privacy leakage. Users, often willingly, share personal identifying information about themselves, but do not have a clear idea of who accesses their private ...
Lockr: social access control for web 2.0
Sharing personal content online is surprisingly hard despite the recent emergence of a huge number of content sharing systems and sites. These systems suffer from several drawbacks: they each have a different way of providing access control which cannot ...
NOYB: privacy in online social networks
Increasingly, Internet users trade privacy for service. Facebook, Google, and others mine personal information to target advertising. This paper presents a preliminary and partial answer to the general question "Can users retain their privacy while ...
Photo-based authentication using social networks
We present Lineup, a system that uses the social network graph in Facebook and auxiliary information (e.g., "tagged" user photos) to build a photo-based Web site authentication framework. Lineup's underlying mechanism leverages the concept of CAPTCHAs, ...
Authenticated out-of-band communication over social links
Many existing host-based applications rely on their own authentication mechanisms and peer discovery services. Although social networking sites already provide mechanisms for users both to discover other users (e.g., by logging on to the social network ...
Are you moved by your social network application?
- Abderrahmen Mtibaa,
- Augustin Chaintreau,
- Jason LeBrun,
- Earl Oliver,
- Anna-Kaisa Pietilainen,
- Christophe Diot
This paper studies a Bluetooth-based mobile social network application deployed among a group of 28 participants collected during a computer communication conference. We compare the social graph containing friends, as defined by participants, to the ...
Opportunistic spatial gossip over mobile social networks
This paper investigates how the principles underlying online social network services could be used to take advantage of node mobility in an opportunistic manner. As an example, we show how to take advantage of opportunistic contacts between mobile ...
Characterizing user mobility in second life
In this work we present a measurement study of user mobility in Second Life. We first discuss different techniques to collect user traces and then focus on results obtained using a crawler that we built. Tempted by the question whether our methodology ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
WOSN '12 | 36 | 12 | 33% |
Overall | 36 | 12 | 33% |