正在加载图片...
·784. 智能系统学报 第11卷 [3]AGRAWAL R,GOLSHAN B,PAPALEXAKIS E.Whither els for social behavior modeling in face-to face interaction social networks for web search[C]//Proceedings of the 21th [J].Pattern recognition letters,2016,74:82-89. ACM SIGKDD International Conference on Knowledge Dis- [15]RODRIGUEZ M G,BALDUZZI D,SCHOLKOPF B.Un- covery and Data Mining.New York,NY,USA:ACM, covering the temporal dynamics of diffusion Networks 2015:1661-1670. [C]//Proceedings of the 28th International Conference on [4]贺超波,汤庸,麦辉强,等.在线社交网络挖掘综述[J] Machine Learning.Bellevue,Washington,USA:ICML, 武汉大学学报:理学版,2014,60(3):189-200. 2011:561-568. HE Chaobo,TANG Yong,MAI Huigiang,et al.A survey [16]JONES S,WEUTHEN T,HARMER Q J,et al.Modeling on online social network Mining[J].Journal of Wuhan uni- information propagation with survival theory[J].Philosoph- versity:natural science edition,2014,60(3):189-200. ical magazine letters,2013,95(2):85-91. [5]SHENG QZ,VASILAKOS A V.YU Qi,et al.Guest edito- [17]RODRIGUEZ M G,LESKOVEC J,BALDUZZI D.et al. rial:big data analytics and the web[J].IEEE transactions Uncovering the structure and temporal dynamics of informa- on big data,2015,1(4):123-124. tion propagation[J].Network science,2014,2(1):26- [6]唐杰,陈文光.面向大社交数据的深度分析与挖掘[J] 65. 科学通报,2015,60(5/6):509-519. [18]SADIKOV E,MEDINA M,LESKOVEC J,et al.Correc- TANG Jie,CHEN Wenguang.MAI Huiqiang Deep analytics ting for missing data in information cascades [C]//Pro- and mining for big social data[J].Chinese science bulletin, ceedings of the Fourth ACM International Conference on 2015,60(5/6):509-519. Web Search and Data Mining.New York,NY,USA: [7]许进,杨扬,蒋飞,等.社交网络结构特性分析及建模 ACM.2011:55-64. 研究进展[J].中国科学院院刊,2015,30(2):216- [19]ROMERO D M,GALUBA W,ASUR S,et al.Influence 228. and passivity in social media[M]//Gunopulos D,Hof- XU Jin,YANG Yang,JIANG Fei,et al.Social network mann T,Hofmann D,et al.Machine Learning and Knowl- structure feature analysis and its modelling[J].Bulletin of edge Discovery in Databases.Berlin Heidelberg:Springer, Chinese academy of sciences,2015,30(2):216-228. 2010:18-33. []AGGARWAL CC.Social network analysis[J].Encyclope- [20]KIMURA M,SAITO K,OHARA K,et al.Speeding-up dia of social network analysis mining,2015,22(1):109 node influence computation for huge social networks[J]. -127. International journal of data science and analytics,2016,1 [9]HSU T Y,KSHEMKALYANI A D.Modeling social network (1):3-16. topology with variable social vector clocks[C]//Proceedings [21]GUILLE A,HACID H,FAVRE C.Predicting the temporal of 2015 IEEE/ACM International Conference on Advances dynamics of information diffusion in social networks[] in Social Networks Analysis and Mining.Paris,France: Computer science,2013,144(1):1145-1152. IEEE.2015:584-589. [22]XU Xin,CHEN Xin,EUN D Y.Modeling time-sensitive [10]DONG Yuxiao.User modeling in large social networks information diffusion in online social networks [C]//Pro- [C]//Proceedings of the Ninth ACM International Con- ceedings of 2015 IEEE Conference on Computer Communi- ference on Web Search and Data Mining.New York,NY, cations Workshops (INFOCOM WKSHPS).Hong Kong, USA:ACM,2016:713. China:IEEE,2015:408-413. [11]SLAUGHTER A J,KOEHLY L M.Multilevel models for [23]WEN Sheng,HAGHIGHI M S,CHEN Chao,et al.A social networks:hierarchical bayesian approaches to expo- sword with two edges:propagation studies on both positive nential random graph modeling [J].Social networks, and negative information in online social networks[J]. 2016,44:334-345. IEEE transactions on computers,2015,64(3):640-653. [12]AMATO F,MOSCATO V,PICARIELLO A,et al.Multi- [24]TUAROB S,TUCKER C S,SALATHE M,et al.Modeling media social network modeling:a proposal[C]//Proceed- individual-level infection dynamics using social network in- ings of 2016 IEEE Tenth International Conference on Se- formation[C]//Proceedings of the 24th ACM International mantic Computing.Laguna Hills,CA,USA:IEEE,2016: on Conference on Information and Knowledge Management 448-453. New York,NY,USA:ACM,2015:1501-1510. [13]BAJAJ A,SEN S.Simulating the effect of social network [25]TAMBUSCIO M,RUFFO G,FLAMMINI A,et al.Fact- structure on workflow efficiency performance[J].Social checking effect on viral hoaxes:a model of misinformation networking,2014,3(1):32-40. spread in social networks[C]//Proceedings of the 24th In- [14]MIHOUB A,BAILLY G,WOLF C,et al.Graphical mod- ternational Conference on World Wide Web.New York,[3]AGRAWAL R, GOLSHAN B, PAPALEXAKIS E. Whither social networks for web search[C] / / Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Dis⁃ covery and Data Mining. New York, NY, USA: ACM, 2015: 1661-1670. [4]贺超波, 汤庸, 麦辉强, 等. 在线社交网络挖掘综述[J]. 武汉大学学报: 理学版, 2014, 60(3): 189-200. HE Chaobo, TANG Yong, MAI Huiqiang, et al. A survey on online social network Mining[J]. Journal of Wuhan uni⁃ versity: natural science edition, 2014, 60(3): 189-200. [5]SHENG Q Z, VASILAKOS A V, YU Qi, et al. Guest edito⁃ rial: big data analytics and the web[ J]. IEEE transactions on big data, 2015, 1(4): 123-124. [6]唐杰, 陈文光. 面向大社交数据的深度分析与挖掘[ J]. 科学通报, 2015, 60(5 / 6): 509-519. TANG Jie, CHEN Wenguang. MAI Huiqiang Deep analytics and mining for big social data[J]. Chinese science bulletin, 2015, 60(5 / 6): 509-519. [7]许进, 杨扬, 蒋飞, 等. 社交网络结构特性分析及建模 研究进展[ J]. 中国科学院院刊, 2015, 30 ( 2): 216 - 228. XU Jin, YANG Yang, JIANG Fei, et al. Social network structure feature analysis and its modelling[ J]. Bulletin of Chinese academy of sciences, 2015, 30(2): 216-228. [8]AGGARWAL C C. Social network analysis[ J]. Encyclope⁃ dia of social network analysis & mining, 2015, 22(1): 109 -127. [9]HSU T Y, KSHEMKALYANI A D. Modeling social network topology with variable social vector clocks[C] / / Proceedings of 2015 IEEE/ ACM International Conference on Advances in Social Networks Analysis and Mining. Paris, France: IEEE, 2015: 584-589. [10 ] DONG Yuxiao. User modeling in large social networks [C] / / Proceedings of the Ninth ACM International Con⁃ ference on Web Search and Data Mining. New York, NY, USA: ACM, 2016: 713. [11] SLAUGHTER A J, KOEHLY L M. Multilevel models for social networks: hierarchical bayesian approaches to expo⁃ nential random graph modeling [ J ]. Social networks, 2016, 44: 334-345. [12]AMATO F, MOSCATO V, PICARIELLO A, et al. Multi⁃ media social network modeling: a proposal[C] / / Proceed⁃ ings of 2016 IEEE Tenth International Conference on Se⁃ mantic Computing. Laguna Hills, CA, USA: IEEE, 2016: 448-453. [13]BAJAJ A, SEN S. Simulating the effect of social network structure on workflow efficiency performance [ J]. Social networking, 2014, 3(1): 32-40. [14]MIHOUB A, BAILLY G, WOLF C, et al. Graphical mod⁃ els for social behavior modeling in face⁃to face interaction [J]. Pattern recognition letters, 2016, 74: 82-89. [15]RODRIGUEZ M G, BALDUZZI D, SCHÖLKOPF B. Un⁃ covering the temporal dynamics of diffusion Networks [C] / / Proceedings of the 28th International Conference on Machine Learning. Bellevue, Washington, USA: ICML, 2011: 561-568. [16]JONES S, WEUTHEN T, HARMER Q J, et al. Modeling information propagation with survival theory[J]. Philosoph⁃ ical magazine letters, 2013, 95(2): 85-91. [17]RODRIGUEZ M G, LESKOVEC J, BALDUZZI D, et al. Uncovering the structure and temporal dynamics of informa⁃ tion propagation[J]. Network science, 2014, 2(1): 26- 65. [18]SADIKOV E, MEDINA M, LESKOVEC J, et al. Correc⁃ ting for missing data in information cascades [ C] / / Pro⁃ ceedings of the Fourth ACM International Conference on Web Search and Data Mining. New York, NY, USA: ACM, 2011: 55-64. [19]ROMERO D M, GALUBA W, ASUR S, et al. Influence and passivity in social media [ M] / / Gunopulos D, Hof⁃ mann T, Hofmann D, et al. Machine Learning and Knowl⁃ edge Discovery in Databases. Berlin Heidelberg: Springer, 2010: 18-33. [20]KIMURA M, SAITO K, OHARA K, et al. Speeding⁃up node influence computation for huge social networks [ J]. International journal of data science and analytics, 2016, 1 (1): 3-16. [21]GUILLE A, HACID H, FAVRE C. Predicting the temporal dynamics of information diffusion in social networks [ J]. Computer science, 2013, 144(1): 1145-1152. [22]XU Xin, CHEN Xin, EUN D Y. Modeling time⁃sensitive information diffusion in online social networks [ C] / / Pro⁃ ceedings of 2015 IEEE Conference on Computer Communi⁃ cations Workshops ( INFOCOM WKSHPS). Hong Kong, China: IEEE, 2015: 408-413. [23] WEN Sheng, HAGHIGHI M S, CHEN Chao, et al. A sword with two edges: propagation studies on both positive and negative information in online social networks [ J ]. IEEE transactions on computers, 2015, 64(3): 640-653. [24]TUAROB S, TUCKER C S, SALATHE M, et al. Modeling individual⁃level infection dynamics using social network in⁃ formation[C] / / Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. New York, NY, USA: ACM, 2015: 1501-1510. [25] TAMBUSCIO M, RUFFO G, FLAMMINI A, et al. Fact⁃ checking effect on viral hoaxes: a model of misinformation spread in social networks[C] / / Proceedings of the 24th In⁃ ternational Conference on World Wide Web. New York, ·784· 智 能 系 统 学 报 第 11 卷
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有