{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:20:43Z","timestamp":1742995243146,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":19,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461461692"},{"type":"electronic","value":"9781461461708"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-6170-8_289","type":"book-chapter","created":{"date-parts":[[2014,10,4]],"date-time":"2014-10-04T14:48:29Z","timestamp":1412434109000},"page":"1771-1777","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Social Communication Network, Case Study"],"prefix":"10.1007","author":[{"given":"Bo","family":"Xu","sequence":"first","affiliation":[]},{"given":"Deqing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yanghua","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,5]]},"reference":[{"key":"289_CR19479","doi-asserted-by":"crossref","first-page":"1175","DOI":"10.1145\/1526709.1526915","volume-title":"Proceedings of the 18th international conference on World wide web","author":"Z Dong","year":"2009","unstructured":"Dong Z, Song G, Xie K, Wang J (2009) An experimental study of large-scale mobile social network. In: Proceedings of the 18th international conference on World wide web. ACM, pp 1175\u20131176"},{"issue":"5981","key":"289_CR19480","first-page":"1029","volume":"328","author":"N Eagle","year":"2010","unstructured":"Eagle N, Macy M, Claxton R (2010) Network diversity and economic development. Science 328(5981):1029\u2013 1031. doi:10.1126\/science.1186605","journal-title":"Science"},{"key":"289_CR19481","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-7142-5","volume-title":"Handbook of social network technologies and applications","author":"B Furht","year":"2010","unstructured":"Furht B (2010) Handbook of social network technologies and applications. Springer, New York"},{"issue":"6","key":"289_CR19482","doi-asserted-by":"crossref","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"M Granovetter","year":"1973","unstructured":"Granovetter M (1973) The strength of weak ties. Am J Sociol 78(6):1360\u20131380","journal-title":"Am J Sociol"},{"key":"289_CR19483","first-page":"201","volume-title":"Sociological theory","author":"M Granovetter","year":"1983","unstructured":"Granovetter M (1983) The strength of weak ties: a network theory revisited. In: Sociological theory, Wiley, New Jersey, pp 201\u2013233"},{"key":"289_CR19484","doi-asserted-by":"crossref","first-page":"915","DOI":"10.1145\/1367497.1367620","volume-title":"Proceedings of the 17th international conference on World Wide Web, WWW '08, Beijing, China","author":"J Leskovec","year":"2008","unstructured":"Leskovec J, Horvitz E (2008) Planetary-scale views on a large instant-messaging network. In: Proceedings of the 17th international conference on World Wide Web, WWW '08, Beijing, China. ACM, New York, pp 915\u2013 924"},{"key":"289_CR19485","doi-asserted-by":"crossref","first-page":"10:1.10","DOI":"10.1145\/1412228.1455266","volume":"13","author":"C Magnien","year":"2009","unstructured":"Magnien C, Latapy M, Habib M (2009) Fast computation of empirically tight bounds for the diameter of massive graphs. J Exp Algorithmics 13:10:1.10\u201310:1.9","journal-title":"J Exp Algorithmics"},{"key":"289_CR19486","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1145\/1183614.1183678","volume-title":"Proceedings of the 15th ACM international conference on Information and knowledge management, CIKM '06","author":"AA Nanavati","year":"2006","unstructured":"Nanavati AA, Gurumurthy S, Das G, Chakraborty D, Dasgupta K, Mukherjea S, Joshi A (2006) On the structural properties of massive telecom call graphs: findings and implications. In: Proceedings of the 15th ACM international conference on Information and knowledge management, CIKM '06. ACM, New York, pp 435\u2013444"},{"issue":"20","key":"289_CR19487","doi-asserted-by":"crossref","first-page":"208701","DOI":"10.1103\/PhysRevLett.89.208701","volume":"89","author":"MEJ Newman","year":"2002","unstructured":"Newman MEJ (2002) Assortative mixing in networks. Phys Rev Lett 89(20):208701","journal-title":"Phys Rev Lett"},{"issue":"3","key":"289_CR19488","doi-asserted-by":"crossref","first-page":"035101","DOI":"10.1103\/PhysRevE.66.035101","volume":"66","author":"M Newman","year":"2002","unstructured":"Newman M, Forrest S, Balthrop J (2002) Email networks and the spread of computer viruses. Phys Rev E 66(3):035101","journal-title":"Phys Rev E"},{"issue":"6","key":"289_CR19489","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1088\/1367-2630\/9\/6\/179","volume":"9","author":"JP Onnela","year":"2007","unstructured":"Onnela JP, Saramaki J, Hyvonen J, Szab G, de Menezes MA, Kaski K, Barabsi AL, Kertsz J (2007) Analysis of a large-scale weighted network of one-to-one human communication. New J Phys 9(6):179","journal-title":"New J Phys"},{"issue":"25","key":"289_CR19490","doi-asserted-by":"crossref","first-page":"258701","DOI":"10.1103\/PhysRevLett.87.258701","volume":"87","author":"R Pastor-Satorras","year":"2001","unstructured":"Pastor-Satorras R, Vazquez A, Vespignani A (2001) Dynamical and correlation properties of the internet. Phys Rev Lett 87(25):258701","journal-title":"Phys Rev Lett"},{"issue":"18","key":"289_CR19491","doi-asserted-by":"crossref","first-page":"7332","DOI":"10.1073\/pnas.0610245104","volume":"104","author":"J Saramaki","year":"2007","unstructured":"Saramaki J, pekka Onnela J (2007) Structure and tie strengths in mobile communication networks. Proc Natl Acad Sci 104(18):7332\u20137336","journal-title":"Proc Natl Acad Sci"},{"key":"289_CR19492","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1145\/1401890.1401963","volume-title":"Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, Las Vegas, Nevada, USA, KDD '08","author":"M Seshadri","year":"2008","unstructured":"Seshadri M, Machiraju S, Sridharan A, Bolot J, Faloutsos C, Leskove J (2008) Mobile call graphs: beyond power-law and lognormal distributions. In: Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, Las Vegas, Nevada, USA, KDD '08. ACM, New York, pp 596\u2013604"},{"issue":"1","key":"289_CR19493","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/584091.584093","volume":"5","author":"C Shannon","year":"2001","unstructured":"Shannon C (2001) A mathematical theory of communication. ACM SIGMOBILE Mobile Comput Commun Rev 5(1):3\u201355","journal-title":"ACM SIGMOBILE Mobile Comput Commun Rev"},{"issue":"6","key":"289_CR19494","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1147\/JRD.2010.2066050","volume":"54","author":"C Wang","year":"2010","unstructured":"Wang C, Zhang Y, Chen X, Liu Z, Shi L, Chen G, Qiu F, Ying C, Lu W (2010) A behavior-based sms antispam system. IBM J Res Dev 54(6):3","journal-title":"IBM J Res Dev"},{"key":"289_CR19495","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications. Structural analysis in the social sciences","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications. Structural analysis in the social sciences. Cambridge University Press, Cambridge"},{"key":"289_CR19496","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/948187.948190","volume-title":"Proceedings of the 2003 ACM workshop on Rapid malcode","author":"N Weaver","year":"2003","unstructured":"Weaver N, Paxson V, Staniford S, Cunningham R (2003) A taxonomy of computer worms. In: Proceedings of the 2003 ACM workshop on Rapid malcode. Washington, DC, USA, ACM, pp 11\u201318"},{"key":"289_CR19497","first-page":"409","volume-title":"Proceedings, 13th International Conference on Computer communications and networks, ICCCN 2004","author":"C Zou","year":"2004","unstructured":"Zou C, Towsley D, Gong W (2004) Email worm modeling and defense. In: Proceedings, 13th International Conference on Computer communications and networks, ICCCN 2004. Chicago, Illinois, IEEE, pp 409\u2013414"}],"container-title":["Encyclopedia of Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-6170-8_289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T23:47:39Z","timestamp":1650325659000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-6170-8_289"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9781461461692","9781461461708"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-6170-8_289","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"5 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}