A Visual Analytics System for Making Sense of Real-Time Twitter Streams

Total Page:16

File Type:pdf, Size:1020Kb

A Visual Analytics System for Making Sense of Real-Time Twitter Streams Western University Scholarship@Western Electronic Thesis and Dissertation Repository 1-31-2020 10:00 AM A Visual Analytics System for Making Sense of Real-Time Twitter Streams Amir HaghighatiMaleki The University of Western Ontario Supervisor Sedig, Kamran The University of Western Ontario Co-Supervisor Haque, Anwar The University of Western Ontario Graduate Program in Computer Science A thesis submitted in partial fulfillment of the equirr ements for the degree in Master of Science © Amir HaghighatiMaleki 2020 Follow this and additional works at: https://ir.lib.uwo.ca/etd Part of the Artificial Intelligence and Robotics Commons, Computer and Systems Architecture Commons, Databases and Information Systems Commons, Numerical Analysis and Scientific Computing Commons, Other Computer Engineering Commons, Science and Technology Studies Commons, Social Statistics Commons, Software Engineering Commons, and the Systems Architecture Commons Recommended Citation HaghighatiMaleki, Amir, "A Visual Analytics System for Making Sense of Real-Time Twitter Streams" (2020). Electronic Thesis and Dissertation Repository. 6809. https://ir.lib.uwo.ca/etd/6809 This Dissertation/Thesis is brought to you for free and open access by Scholarship@Western. It has been accepted for inclusion in Electronic Thesis and Dissertation Repository by an authorized administrator of Scholarship@Western. For more information, please contact [email protected]. Abstract Through social media platforms, massive amounts of data are being produced. Twitter, as one such platform, enables users to post “tweets” on an unprecedented scale. Once analyzed by machine learning (ML) techniques and in aggregate, Twitter data can be an invaluable resource for gaining insight. However, when applied to real-time data streams, due to covariate shifts in the data (i.e., changes in the distributions of the inputs of ML algorithms), existing ML approaches result in different types of biases and provide uncertain outputs. This thesis describes a visual analytics system (i.e., a tool that combines data visualization, human-data interaction, and ML) to help users make sense of the real-time streams on Twitter. As proofs of concept, public-health and political discussions were analyzed. The system not only provides categorized and aggregate results but also enables the stakeholders to diagnose and to heuristically suggest fixes for the errors in the outcome. Keywords Visual Analytics, Stream Processing, Real-Time Twitter Analysis, Human-Information Interaction ii Summary for Lay Audience Through social media platforms, massive amounts of data are being produced. Twitter, as a microblogging social media platform, enables users to post short updates as “tweets” on an unprecedented scale. Once analyzed by using machine learning (ML) techniques and in aggregate, Twitter data can be an invaluable resource for gaining insight. However, when applied to real-time data streams, due to covariate shifts in the data (i.e., changes in the distributions of the inputs of ML algorithms), existing ML approaches result in different types of biases and provide uncertain outputs. This thesis describes a visual analytics system (i.e., a tool that combines data visualization, human-data interaction, and ML) to help users monitor, analyze, and make sense of the streams of discussions on Twitter in a real-time manner. This system helps the users to understand “who” is talking about “what” and “how” and/or “why” a tweet is posted. As case-studies, we use public-health and election discussions to demonstrate the capabilities enabled by the system. The system then not only provides categorized and aggregate results of such discussions but also enables the stakeholders to diagnose and to heuristically suggest fixes for the errors in the outcome, resulting in a more detailed understanding of the discussions. iii Acknowledgments Words cannot describe my gratefulness to my wonderful supervisors, Dr. Kamran Sedig and Dr. Anwar Haque. I would like to specifically express my sincerest gratitude to Dr. Sedig without whose exemplary, sound advice this work would not have been possible. I am truly indebted to your dedication, life-lessons, and fatherly mentorship. No one can hope for a better supervisor. I am also thankful to Wenjun Chen for her generous help during the initial course of this project. Finally, I offer my deepest gratitude to my parents, Rahele and Akbar, without whose sacrifices and vision of the future, I could not even be where I am today. iv Table of Contents Abstract ............................................................................................................................... ii Summary for Lay Audience ............................................................................................... iii Acknowledgments.............................................................................................................. iv Table of Contents ................................................................................................................ v List of Tables .................................................................................................................... vii List of Figures .................................................................................................................. viii List of Appendices .............................................................................................................. x Chapter 1 ............................................................................................................................. 1 1 Introduction .................................................................................................................... 1 1.1 Twitter: a Microblogging Platform ......................................................................... 2 1.2 Usages and Challenges ........................................................................................... 4 1.2.1 Twitter for Health Research ........................................................................ 6 1.2.2 Twitter for Election Campaigns .................................................................. 7 1.3 Constraints on Data Collection ............................................................................... 8 1.4 Research Questions ............................................................................................... 10 Chapter 2 ........................................................................................................................... 12 2 Background .................................................................................................................. 12 2.1 Approaches for Twitter Data Analysis ................................................................. 12 2.1.1 Assessing “who” ....................................................................................... 13 2.1.2 Assessing “what” ...................................................................................... 14 2.1.3 Assessing “how” ....................................................................................... 14 2.1.4 Assessing “why” ....................................................................................... 15 2.2 Stream Processing ................................................................................................. 16 2.2.1 Covariate Shift .......................................................................................... 19 v 2.3 Visual Analytics .................................................................................................... 20 2.3.1 Computational Tools and Techniques ...................................................... 21 2.3.2 Visualizations ............................................................................................ 21 2.3.3 Interactions ................................................................................................ 22 2.3.4 Human-Information Interaction ................................................................ 22 Chapter 3 ........................................................................................................................... 23 3 System Design .............................................................................................................. 23 3.1 Data Flow Design: Pipeline Architecture ............................................................. 24 3.1.1 Pre-Processor ............................................................................................ 26 3.1.2 Sentiment Analyzer ................................................................................... 27 3.1.3 Label Predictor (Classifier) ....................................................................... 27 3.2 Interface Design .................................................................................................... 30 3.2.1 A Progressive Web Application................................................................ 30 3.2.2 Analytics Page .......................................................................................... 32 3.2.3 Compare Page ........................................................................................... 34 3.2.4 Shuffler Page ............................................................................................. 36 3.3 Case Studies .......................................................................................................... 43 3.3.1 Public-Health Research ............................................................................
Recommended publications
  • Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
    Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites.
    [Show full text]
  • Federated Systems
    Federated Systems Jeremy Rubin [email protected] December 9, 2015 Abstract Federation is an amazingly powerful tool in a system designer’s tool belt. This work provides a unifying definition for federated. In abbrevia- tion: a system is federated when there are multiple providers of an iden- tical (or nearly identical), interoperable service. The federated paradigm o↵ers much improved fault tolerance, liberty, and privacy over centralized alternatives. The federated paradigm applies to all sorts of systems, from governmental to web services. However, this paradigm seems to be unsus- tainable, either devolving into centralized systems or being outpaced by them. In this paper, I will delve into multiple examples of federated sys- tems, exploring their successes and failures, as well as delving into what caused the decay of these systems. In reflection, I will also provide sev- eral suggestions on how system developers might harden their use of this paradigm. 1 Contents 1 Introduction: 3 2 Defining Federation: 5 2.1 Governmental Federations . 6 2.2 ComputerScience .......................... 8 2.2.1 Simple Sharded Database . 8 2.2.2 Federated Byzantine Agreement . 8 2.2.3 Federated Cryptography . 9 2.3 FederatedIdentity .......................... 9 2.4 TheDefinition ............................ 10 3 Case Studies 11 3.1 E-Mail................................. 12 3.2 Blog.................................. 14 3.3 XMPP................................. 15 3.4 DNS.................................. 16 3.5 Security Assertion Markup Language . 17 3.6 McDonald’s . 18 3.7 Social Networks . 18 3.7.1 Failures in Centralized Social Networks . 18 3.7.2 Hope in Federation? . 20 4 Conclusion 21 4.1 The Federated System Designer’s Handbook .
    [Show full text]
  • Functional Breakdown of Decentralised Social Networks
    University of Amsterdam Master System and Network Engineering Research Project 2 Functional breakdown of decentralised social networks Student: Supervisor: Wouter Miltenburg Michiel Leenaars [email protected] [email protected] July 6, 2015 Abstract Current centralised social networks are used by a huge number of users for a variety of reasons. With Facebook, Google+, LinkedIn, or Twitter, users are not in control of their own data and access control is centralised and proprietary. Decentralised social networks could be a solution to these problems and gives the control of the data back to users. This research is focused on the question which of the decentralised social networks is currently most suited to be provided as a service by hosting providers. This paper will therefore provide information about the current implementations, the protocols used by the various implementations, and will give a functional breakdown of the various decentralised social networks. Various implementations have been analysed, namely diaspora*, Friendica, GNU social, pump.io, and RedMatrix. The paper also describes the set of standards and protocols used by the various implementations. As most implementations use their own protocol, or implement the standards slightly differently, there is no interoperability without the use of extra plugins or enabling certain features. While there are a lot of standards for facilitating the message exchange, there are however standards missing that would make interoperability possible, which is described in this paper as well. RedMatrix is currently most suited to be provided as an alternative to the current centralised social networks and that can be provided as a service by hosting providers.
    [Show full text]
  • The Case for Alternative Social Media © the Author(S) 2015 DOI: 10.1177/2056305115604338 Sms.Sagepub.Com
    SMSXXX10.1177/2056305115604338Social Media + SocietyGehl 604338research-article2015 SI: Culture Digitally Social Media + Society July-December 2015: 1 –12 The Case for Alternative Social Media © The Author(s) 2015 DOI: 10.1177/2056305115604338 sms.sagepub.com Robert W. Gehl Abstract What are “alternative social media”? How can we distinguish alternative social media from mainstream social media? Why are social media alternatives important? How do they work? Why do people make them? What do they tell us about contemporary corporate social media and its related phenomena: surveillance, privacy, power, self-expression, and sociality? This essay answers these questions by theorizing alternative social media. The empirical data for this alternative social media theory are drawn from previous work on alternative sites such as Diaspora, rstat.us, Twister, GNU social, and the Dark Web Social Network. These cases are used to build a generalized conceptual framework. However, this article does not solely theorize from these examples, but rather seeks to contextualize and historicize alternative social media theory within larger bodies of work. In addition to generalization from examples, the theory is informed by two threads. The first thread is the work of alternative media scholars such as Nick Couldry, Chris Atton, and Clemencia Rodriguez, who have done the historical and theoretical work to define alternative media. The second thread is a synthesis of works exploring the technical side of contemporary media, coming from new fields such as software studies. The threads and empirical analyses of sites such as Diaspora, Quitter, and rstat.us are combined into a theoretical matrix that can account for the processes and technical infrastructures that comprise social media alternatives and explain why they are distinct from sites such as Facebook, Twitter, and Google, as well as why they are important.
    [Show full text]
  • GNU Social New Frontend Classic
    GNU social - New Frontend Classic Eliseu Amaro Name: Eliseu António Pinto Amaro Email: [email protected] Website: https://github.com/rainydaysavings/ Time zone: GMT+1 Proof of competence: https://notabug.org/rainydaysavings/NewFrontendClassic Summary GNU social is a communications software used in federated/decentralized social networks. It is part of the GNU project as the name implies and it follows the Unix-philosophy where small programs do a small job. It’s my intention to follow this doctrine as well as being compatible with the AnyBrowser campaign. To achieve this, the design must be simple, modern and improve the UX by virtue of visual movement flow through means of careful placement of design elements and the good use of typography principles that will help infuse character, beauty and provide better readability for the user. Mechanical memory is a big part of how we use the web, we are mostly unconscious of the actions we take and because of this it’s imperative for a social network’s design to exploit procedural memory in order to not only guide the user but also improve their experience overall. Design principles Mechanical memory and movement flow The act of reading throughout our life injected us with some of this mechanical memory that we use in the web today, aiding us performing tasks better and faster. Some western web design principles are fairly dominant even though most cultures throughout the world use different writing systems, one example of this are menus placement in Japanese websites, although the language can be written from left to right (tategaki) or top to bottom (yokogaki), menus tend to be placed following mostly LTR principles (Cyr and Trevor-Smith, 2004).
    [Show full text]
  • Privacy Analysis on Microblogging Online Social Networks: a Survey
    This report is under review by ACM Computing Surveys (CSUR) December 2017 Privacy Analysis on Microblogging Online Social Networks: a Survey Samia Oukemeni1, Helena Rifa-Pous` 2, Joan Manuel Marques` Puig3 Abstract In the last ten years, Online Social Networks (OSNs) embrace many different forms of interactive communication, including multimedia sharing, microblogging services, etc. They allow users to create profiles, connect with friends and share their daily activities and thoughts. However, this ease of use of OSNs come with a cost in terms of users’ privacy and security. The big amount of personal data shared in the users’ profiles or correlated from their activities can be stored, processed and sold for advertisement or statistical purposes. It attracts also malicious users who can collect and exploit the data and target different types of attacks. In this paper, we review the state of the art of OSNs existing either in the literature or deployed for use. We focus on the OSN systems that offer, but not exclusively, microblogging services. We analyze and evaluate each system based on a set of characteristics, and we compare them based on their usability and the level of protection of privacy and security they provide. This study is a first step towards understanding the security and privacy controls and measuring their level in an OSN. Keywords Online social networks (OSNs) – Microblogging systems — Social network security and privacy – Privacy protections – Usability in security and privacy [email protected], Universitat Oberta de Catalunya, Barcelona, Spain [email protected], Universitat Oberta de Catalunya, Barcelona, Spain [email protected], Universitat Oberta de Catalunya, Barcelona, Spain Contents 4.3 Functionalities.......................
    [Show full text]
  • A Pluralist Approach to Democratizing Online Discourse
    A Pluralist Approach to Democratizing Online Discourse Jay Chen Barath Raghavan International Computer Science Institute University of Southern California [email protected] [email protected] Paul Schmitt Tai Liu Princeton NYU Abu Dhabi [email protected] [email protected] ABSTRACT Freedom of speech is key to democracy. A free and open Online discourse takes place in corporate-controlled spaces Internet is key to modern global society. Yet how does one thought by users to be public realms. These platforms in reconcile the perspectives above, which speak to fundamental name enable free speech but in practice implement varying issues and are at once in agreement and at odds? Throughout degrees of censorship either by government edict or by uneven the 20th century the greatest threat to free speech was that and unseen corporate policy. This kind of censorship has of government censorship. Indeed, this persists under autoc- no countervailing accountability mechanism, and as such racies around the world (e.g., China, Iran) but it has fused platform owners, moderators, and algorithms shape public with corporate censorship, with autocracies using corporate discourse without recourse or transparency. partners to implement censorship, or corporate moderators Systems research has explored approaches to decentraliz- unevenly removing unprofitable or unpalatable speech. ing or democratizing Internet infrastructure for decades. In The character of discourse online is not only a matter of parallel, the Internet censorship literature is replete with ef- policy or culture, but also one of systems: the systems that forts to measure and overcome online censorship. However, provide or prevent the exercise of free speech.
    [Show full text]
  • Building Standardized and Secure Mobile Health Services Based on Social Media
    electronics Article Building Standardized and Secure Mobile Health Services Based on Social Media Jesús D. Trigo 1,* , Óscar J. Rubio 2 , Miguel Martínez-Espronceda 1, Álvaro Alesanco 3 , José García 3 and Luis Serrano-Arriezu 1 1 Department of Electrical, Electronic and Communications Engineering, Public University of Navarra, Institute of Smart Cities (ISC), Navarra Institute for Health Research (IdiSNA), 31006 Pamplona, Spain; [email protected] (M.M.-E.); [email protected] (L.S.-A.) 2 Everis Assets, 50009 Zaragoza, Spain; [email protected] 3 Department of Electronics Engineering and Communications, University of Zaragoza, Aragón Institute of Engineering Research (I3A), 50018 Zaragoza, Spain; [email protected] (Á.A.); [email protected] (J.G.) * Correspondence: [email protected] Received: 20 October 2020; Accepted: 18 December 2020; Published: 21 December 2020 Abstract: Mobile devices and social media have been used to create empowering healthcare services. However, privacy and security concerns remain. Furthermore, the integration of interoperability biomedical standards is a strategic feature. Thus, the objective of this paper is to build enhanced healthcare services by merging all these components. Methodologically, the current mobile health telemonitoring architectures and their limitations are described, leading to the identification of new potentialities for a novel architecture. As a result, a standardized, secure/private, social-media-based mobile health architecture has been proposed and discussed. Additionally, a technical proof-of-concept (two Android applications) has been developed by selecting a social media (Twitter), a security envelope (open Pretty Good Privacy (openPGP)), a standard (Health Level 7 (HL7)) and an information-embedding algorithm (modifying the transparency channel, with two versions).
    [Show full text]
  • Implementing Federated Social Networking
    Implementing Federated Social Networking: Report from the Trenches Gabriel Silva Larissa Reis Antonio Terceiro Faculty Gama (FGA) Colivre Colivre University of Brasília Salvador, Brazil Salvador, Brazil Gama, Brazil [email protected] [email protected] [email protected] Paulo Meirelles Fabio Kon Faculty Gama (FGA) FLOSS Competence Center University of Brasília University of São Paulo Gama, Brazil São Paulo, Brazil [email protected] [email protected] ABSTRACT INTRODUCTION The federation of social networks aims at integrating users Social networks, or social media, can be defined as platforms by means of a decentralized structure, enabling the interoper- that allow individuals to connect to others, share personal ability among multiple social networks in a transparent way. information, and provide content [5]. The information that Despite a few isolated initiatives in federating open social flows in these networks is not always public, but usually takes networks, there is no adoption of any standard, which hinders place by means of private infrastructure that belongs to service the emergence of new, effective federated systems. To under- providers. stand the difficulties in the development and standardization of federated services, we have conducted research on existing In the context of computer security, privacy can be defined as specifications and implementations of interoperability among someone’s capacity of controlling which information related social networks. We have developed a federation proof of to them can be consumed and stored, and with whom it can be concept within the Noosfero platform, implementing a subset shared [17]. In addition to guaranteeing their users’ privacy, of the Diaspora protocol to federate users and public content, social networks must ensure the confidentiality of the informa- in addition to complementary specifications, such as Salmon tion they host, i.e.
    [Show full text]
  • Tracing the Techno-Linguistic Associations of Dietary Hashtags On
    #INSERTDIETHERE: Tracing the Techno-Linguistic Associations of Dietary Hashtags on Instagram by Julie Pasho Thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements for the degree of Master of Arts in Communication Carleton University Ottawa, Ontario © 2017 Julie Pasho Dietary Hashtags Abstract The use of hashtags on social media platforms allows users to navigate vast repositories of information with ease – hashtags technologically mediate as they both enable and shape user experience. This research focuses on the photo-sharing platform of Instagram and the phenomenon of dietary hashtags (DH: singular; DHs: plural) – for example, #healthy, #glutenfree, #vegan, and #whole30. The circulation of these hashtags is analyzed to explore if and how they can influence users’ understanding of diets and eating practices. The study uses Actor-Network Theory to describe the performances and impacts of DHs within a technologically mediated space of social media. Through experimenting with the walkthrough method and an Instagram narrative model, the thesis observes discursive associations in dietary- related Instagram content. Sample case studies look at the ways in which Instagram has enlarged the sphere of possible associations, which consequently alter food and diet related acts. DH discourses and the ways in which they impact dietary visibility, proliferate dietary belief systems, intentional DH performances (user subjectivities), and dietary-based social/communal affiliation (intersubjective discourse) are first considered separately. The results indicate that Instagram supplements and even displaces food-related acts. Moreover, Instagram creates a virtual environment in which visual and linguistic dietary discourse is performed; thus altering how users learn about food practices, as well as enabling the making of dietary-based associations.
    [Show full text]
  • Updating the Propaganda Model for Explaining Political Change in Spain and the Role of Digital Media
    CHAPTER 8 From #15M to Podemos : Updating the Propaganda Model for Explaining Political Change in Spain and the Role of Digital Media Miguel Álvarez-Peralta Every system has its own vulnerabilities. Anonymous 8.1 Introduction This chapter presents a contribution to the ongoing debates regarding the updat- ing of the Propaganda Model for the twenty-first century. It will focus on the model’s boundaries, those situations where it faces difficulties for apprehending some communication dynamics, like social media, countries with a particular political culture (like Spain) and contexts of crisis and instability (2008–2016). These aspects have been noted as possible vulnerabilities of the model that require further exploration,1 together with personal agency and strategies for social change, which I will also take into account. Herman and Chomsky How to cite this book chapter: Álvarez-Peralta, M. 2018. From #15M to Podemos: Updating the Propaganda Model for Explaining Political Change in Spain and the Role of Digital Media. In: Pedro-Carañana, J., Broudy, D. and Klaehn, J. (eds.). The Prop- aganda Model Today: Filtering Perception and Awareness. Pp. 107–124. London: University of Westminster Press. DOI: https://doi.org/10.16997/ book27.h. License: CC‐BY‐NC‐ND 4.0 108 The Propaganda Model Today observed that, ‘it has to be evaluated on a case-by-case basis given the vary- ing degrees and forms of penetration, and different cultural conditions.’2 This chapter aims to open the debate on a meaningful case. 8.2 Discussing the Propaganda Model: Dead Ends and Hot Spots Since the Propaganda Model (hereafter PM) was first formulated, media research has provided strong evidence of its validity3 as a tool to explain the constrictions of news-making processes and the dominance of news framing that favour the interests of elites during periods of stability.
    [Show full text]
  • Implementation of Federation Protocol for Social Networks
    Universidade de Brasília - UnB Faculdade UnB Gama - FGA Software Engineering Implementation of federation protocol for social networks Author: Gabriel dos Santos Silva Supervisor: Prof. Dr. Paulo Roberto Miranda Meirelles Brasília, DF 2017 Gabriel dos Santos Silva Implementation of federation protocol for social networks Dissertation submitted to the undergraduate course in (Software Engineering) of the Uni- versity of Brasília, as a partial requirement to obtain the Title of Bachelor in (Software Engineering). Universidade de Brasília - UnB Faculdade UnB Gama - FGA Supervisor: Prof. Dr. Paulo Roberto Miranda Meirelles Brasília, DF 2017 Gabriel dos Santos Silva Implementation of federation protocol for social networks/ Gabriel dos Santos Silva. – Brasília, DF, 2017- 58 p. : il. (algumas color.) ; 30 cm. Supervisor: Prof. Dr. Paulo Roberto Miranda Meirelles Trabalho de Conclusão de Curso – Universidade de Brasília - UnB Faculdade UnB Gama - FGA , 2017. 1. Federation. 2. Social Networks. I. Prof. Dr. Paulo Roberto Miranda Meirelles. II. Universidade de Brasília. III. Faculdade UnB Gama. IV. Implemen- tation of federation protocol for social networks CDU 02:141:005.6 Gabriel dos Santos Silva Implementation of federation protocol for social networks Dissertation submitted to the undergraduate course in (Software Engineering) of the Uni- versity of Brasília, as a partial requirement to obtain the Title of Bachelor in (Software Engineering). Approved work. Brasília, DF, July 17, 2017: Prof. Dr. Paulo Roberto Miranda Meirelles Supervisor Dr. Tiago Alves da Fonseca Member 1 Dr. Ewout ter Haar Member 2 Brasília, DF 2017 Abstract The federation of social networks aims at integrating users by means of a decentralized structure, enabling the interoperability among multiple social networks in a transparent way.
    [Show full text]