Hamed Abdelhaq

Hamed Abdelhaq
An-Najah National University · Department of Computer Science

Doctor of Philosophy

About

11
Publications
752
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
287
Citations

Publications

Publications (11)
Conference Paper
Social networking and microblogging services such as Twitter provide a continuous source of data from which useful information can be extracted. The detection and characterization of bursty words play an important role in processing such data, as bursty words might hint to events or trending topics of social importance upon which actions can be tri...
Article
Microblogging services such as Twitter, Facebook, and Foursquare have become major sources for information about real-world events. Most approaches that aim at extracting event information from such sources typically use the temporal context of messages. However, exploiting the location information of georeferenced messages, too, is important to de...
Conference Paper
It is nowadays possible to access a huge and increasing stream of social media records. Recently, such data has been used to infer about spatio-temporal phenomena by treating the records as proxy observations of the real world. However, since such observations are heavily uncertain and their spatio-temporal distribution is highly heterogeneous, ext...
Conference Paper
Shared multimedia, microblogs, search engine queries, user comments, and location check-ins, among others, generate an enormous stream of human activity records. Such records consist of information in the form of text, images, or videos, and can often be traced in time and space using associated time/location information. Over the past years such s...
Article
Full-text available
Smartphone users are constantly facing the risks of losing their private information to third‐party mobile applications. Studies have revealed that the vast majority of users either do not pay attention to privacy or unable to comprehend privacy messages. Developers though have exploited this fact by asking users to grant their apps an enormous num...
Conference Paper
Mobile computing is dominating the technology market and it is expected to continue growing. Mobile third-party applications without any doubt contribute vastly to this growth. However, intrusive apps that tend to ask for plenty of permissions are becoming a common trend that influence the privacy of mobile users. Solutions have been proposed to de...
Article
Full-text available
Messages published via social media sites, such as Twitter, Facebook, and Foursquare hide a considerable amount of information about real world events. The timely identification of such events from this huge, unstructured, and noisy user-generated content plays an important role in increasing situation awareness and in supporting useful application...
Thesis
From the recent proliferation of social media channels to the immense amount of user-generated content, an increasing interest in social media mining is currently being witnessed. Messages continuously posted via these channels report a broad range of topics from daily life to global and local events. As a consequence, this has opened new opportuni...
Conference Paper
The continuously increasing popularity of social media sites such as Twitter and Facebook has recently led to a number of approaches to detect and extract event information from social media streams. Such events play an important role, e.g., in supporting location-based services and improving situational awareness. Moreover, the introduction of GPS...

Network

Cited By