{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T04:25:24Z","timestamp":1747196724586,"version":"3.40.5"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319131856"},{"type":"electronic","value":"9783319131863"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13186-3_13","type":"book-chapter","created":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T20:09:58Z","timestamp":1417464598000},"page":"137-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information Diffusion Pattern Mining over Online Social Media"],"prefix":"10.1007","author":[{"given":"Eric Hsueh-Chan","family":"Lu","sequence":"first","affiliation":[]},{"given":"Hui-Ju","family":"Hung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,26]]},"reference":[{"issue":"6","key":"13_CR1","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1038\/nrg2102","volume":"8","author":"U Alon","year":"2007","unstructured":"Alon, U.: Network motifs: theory and experimental approaches. Nat. Rev. Genet. 8(6), 450\u2013461 (2007)","journal-title":"Nat. Rev. Genet."},{"doi-asserted-by":"crossref","unstructured":"Anagnostopoulos, A., Kumar, R., Mahdian, M.: Influence and correlation in social networks. In: KDD, pp. 7\u201315 (2008)","key":"13_CR2","DOI":"10.1145\/1401890.1401897"},{"doi-asserted-by":"crossref","unstructured":"Asur, S., Huberman, B.: Predicting the future with social media. In: Web Intelligence, pp. 492\u2013499 (2010)","key":"13_CR3","DOI":"10.1109\/WI-IAT.2010.63"},{"doi-asserted-by":"crossref","unstructured":"Bakshy, E., Hofman, J., Mason, W., Watts, D.: Everyone\u2019s an influencer: quantifying influence on twitter. In: WSDM, pp. 65\u201374 (2011)","key":"13_CR4","DOI":"10.1145\/1935826.1935845"},{"doi-asserted-by":"crossref","unstructured":"Chen, B., Zhao, Q., Sun, B., Mitra, P.: Predicting blogging behavior using temporal and social networks. In: ICDM, pp. 439\u2013444 (2007)","key":"13_CR5","DOI":"10.1109\/ICDM.2007.97"},{"doi-asserted-by":"crossref","unstructured":"Choudhury, M., Sundaram, H., John, A., Seligmann, D.: Dynamic prediction of communication flow using social context. In: Hypertext, pp. 49\u201354 (2008)","key":"13_CR6","DOI":"10.1145\/1379092.1379105"},{"doi-asserted-by":"crossref","unstructured":"Du, N., Faloutsos, C., Wang, B., Akoglu, L.: Large human communication networks: patterns and a utility-driven generator. In: KDD, pp. 269\u2013278 (2009)","key":"13_CR7","DOI":"10.1145\/1557019.1557054"},{"doi-asserted-by":"crossref","unstructured":"Gruhl, D., Guha, R., Liben-Nowell, D., Tomkins, A.: Information diffusion through blogspace. In: WWW, pp. 491\u2013501 (2004)","key":"13_CR8","DOI":"10.1145\/988672.988739"},{"doi-asserted-by":"crossref","unstructured":"Guo, L., Tan, E., Chen, S., Zhang, X., Zhao, Y.: Analyzing patterns of user content generation in online social networks. In: KDD, pp. 369\u2013378 (2009)","key":"13_CR9","DOI":"10.1145\/1557019.1557064"},{"doi-asserted-by":"crossref","unstructured":"Huan, J., Wang, W., Prins, J.: Efficient mining of frequent subgraph in the presence of isomorphism. In: ICDM, pp. 549\u2013552 (2003)","key":"13_CR10","DOI":"10.1109\/ICDM.2003.1250974"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-45372-5_2","volume-title":"Principles of Data Mining and Knowledge Discovery","author":"A Inokuchi","year":"2000","unstructured":"Inokuchi, A., Washio, T., Motoda, H.: An apriori-based algorithm for mining frequent substructures from graph data. In: Zighed, D.A., Komorowski, J., \u017bytkow, J.M. (eds.) PKDD 2000. LNCS (LNAI), vol. 1910, pp. 13\u201323. Springer, Heidelberg (2000)"},{"key":"13_CR12","first-page":"1038","volume":"16","author":"M Kuramochi","year":"2004","unstructured":"Kuramochi, M., Karypis, G.: An efficient algorithm for discovering frequent subgraphs. TKDE 16, 1038\u20131051 (2004)","journal-title":"TKDE"},{"doi-asserted-by":"crossref","unstructured":"Lin, Y., Chi, Y., Zhu, S., Sundaram, H., Tseng, B.: Facetnet: a framework for analyzing communities and their evolutions in dynamic networks. In: WWW, pp. 685\u2013694 (2008)","key":"13_CR13","DOI":"10.1145\/1367497.1367590"},{"doi-asserted-by":"crossref","unstructured":"Malmgren, R., Hofman, J., Amaral, L., Watts, D.: Characterizing individual communication patterns. In: KDD, pp. 607\u2013616 (2009)","key":"13_CR14","DOI":"10.1145\/1557019.1557088"},{"key":"13_CR15","first-page":"703","volume":"20","author":"A Nanavati","year":"2008","unstructured":"Nanavati, A., Singh, R., Chakraborty, D., Dasgupta, K., Mukherjea, S., Das, G., Gurumurthy, S., Joshi, A.: Analyzing the structure and evolution of massive telecom graphs. IEEE TKDE 20, 703\u2013718 (2008)","journal-title":"IEEE TKDE"},{"unstructured":"Prins, J., Yang, J., Huan, J., Wang, W.: Spin: mining maximal frequent subgraphs from graph databases. In: KDD, pp. 581\u2013586 (2004)","key":"13_CR16"},{"doi-asserted-by":"crossref","unstructured":"Thomas, L., Valluri, S., Karlapalem, K.: Margin: maximal frequent subgraph mining. In: ICDM, pp. 1097\u20131101 (2006)","key":"13_CR17","DOI":"10.1109\/ICDM.2006.102"},{"unstructured":"Yan, X., Han, J.: gSpan: graph-based substructure pattern mining. In: ICDM, pp. 721\u2013724 (2002)","key":"13_CR18"},{"doi-asserted-by":"crossref","unstructured":"Yang, J., Counts, S.: Predicting the speed, scale, and range of information diffusion in twitter. In: ICWSM (2010)","key":"13_CR19","DOI":"10.1609\/icwsm.v4i1.14039"},{"doi-asserted-by":"crossref","unstructured":"Zhao, Q., Tian, Y., He, Q., Oliver, N., Jin, R., Lee, W.-C.: Communication motifs: a tool to characterize social communications. In: CIKM, pp. 1645\u20131648 (2010)","key":"13_CR20","DOI":"10.1145\/1871437.1871694"}],"container-title":["Lecture Notes in Computer Science","Trends and Applications in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13186-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T22:11:18Z","timestamp":1747174278000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-13186-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319131856","9783319131863"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13186-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"26 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}