{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T18:28:10Z","timestamp":1763836090339,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319487427"},{"type":"electronic","value":"9783319487434"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48743-4_5","type":"book-chapter","created":{"date-parts":[[2016,12,16]],"date-time":"2016-12-16T17:42:37Z","timestamp":1481910157000},"page":"55-69","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Faderank: An Incremental Algorithm for Ranking Twitter Users"],"prefix":"10.1007","author":[{"given":"Massimo","family":"Bartoletti","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Lande","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Massa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,2]]},"reference":[{"key":"5_CR1","unstructured":"Lithium Technologies Acquires Klout. http:\/\/www.lithium.com\/company\/news-room\/press-releases\/2014\/lithium-technologies-acquires-klout. Accessed 09 April 2016"},{"key":"5_CR2","unstructured":"Twitter Usage Statistics. Internetlivestats.com http:\/\/www.internetlivestats.com\/twitter-statistics. Accessed 09 April 2016"},{"key":"5_CR3","unstructured":"The top 20 valuable Facebook statistics, December 2015. Zephoria.com https:\/\/zephoria.com\/top-15-valuable-facebook-statistics. Accessed 09 April 2016"},{"key":"5_CR4","first-page":"564","volume-title":"Proceedings 2004 VLDB Conference","author":"Andrey Balmin","year":"2004","unstructured":"Balmin, A., Hristidis, V., Papakonstantinou, Y.: Objectrank: authority-based keyword search in databases. In: VLDB, vol. 30, pp. 564\u2013575 (2004)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-28934-2_5","volume-title":"Formal Aspects of Component Software","author":"M Bartoletti","year":"2016","unstructured":"Bartoletti, M., Cimoli, T., Murgia, M., Podda, A.S., Pompianu, L.: A contract-oriented middleware. In: Braga, C., \u00d6lveczky, P.C. (eds.) FACS 2015. LNCS, vol. 9539, pp. 86\u2013104. Springer, Heidelberg (2016). doi:10.1007\/978-3-319-28934-2_5"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Dimitriou, T., Karame, G., Christou, I.T.: SuperTrust: a secure and efficient framework for handling trust in super-peer networks. In: ACM PODC, pp. 374\u2013375 (2007). http:\/\/doi.acm.org\/10.1145\/1281100.1281180","DOI":"10.1145\/1281100.1281180"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Haveliwala, T.H.: Topic-sensitive pagerank. In: WWW, pp. 517\u2013526. ACM (2002)","DOI":"10.1145\/511511.511513"},{"issue":"1","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1592451.1592452","volume":"42","author":"KJ Hoffman","year":"2009","unstructured":"Hoffman, K.J., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 42(1), 1 (2009)","journal-title":"ACM Comput. Surv."},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-319-26190-4_18","volume-title":"Web Information Systems Engineering \u2013 WISE 2015","author":"W Hu","year":"2015","unstructured":"Hu, W., Zou, H., Gong, Z.: Temporal pagerank on social networks. In: Wang, J., Cellary, W., Wang, D., Wang, H., Chen, S.-C., Li, T., Zhang, Y. (eds.) WISE 2015. LNCS, vol. 9418, pp. 262\u2013276. Springer, Heidelberg (2015). doi:10.1007\/978-3-319-26190-4_18"},{"issue":"2","key":"5_CR10","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: ACM SIGKDD, pp. 137\u2013146. ACM (2003)","DOI":"10.1145\/956750.956769"},{"issue":"1\/2","key":"5_CR12","doi-asserted-by":"publisher","first-page":"81","DOI":"10.2307\/2332226","volume":"30","author":"MG Kendall","year":"1938","unstructured":"Kendall, M.G.: A new measure of rank correlation. Biometrika 30(1\/2), 81\u201393 (1938)","journal-title":"Biometrika"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Lampe, C., Johnston, E.W., Resnick, P.: Follow the reader: filtering comments on slashdot. In: CHI, pp. 1253\u20131262 (2007)","DOI":"10.1145\/1240624.1240815"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Lampe, C., Resnick, P.: Slash(dot) and burn: distributed moderation in a large online conversation space. In: CHI, pp. 543\u2013550 (2004)","DOI":"10.1145\/985692.985761"},{"issue":"2","key":"5_CR15","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11704-013-3901-9","volume":"7","author":"H Ma","year":"2013","unstructured":"Ma, H., Qian, W., Xia, F., He, X., Xu, J., Zhou, A.: Towards modeling popularity of microblogs. Front. Comput. Sci. 7(2), 171\u2013184 (2013)","journal-title":"Front. Comput. Sci."},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Mariani, M.S., Medo, M., Zhang, Y.C.: Ranking nodes in growing networks: when pagerank fails. Scientific reports 5 (2015)","DOI":"10.1038\/srep16181"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Communications and Multimedia Security, IFIP Conference Proceedings, vol. 228, pp. 107\u2013121. Kluwer (2002)","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"5_CR18","unstructured":"Mislove, A., Gummadi, K.P., Druschel, P.: Exploiting social networks for internet search. In: HotNets, p. 79 (2006)"},{"key":"5_CR19","volume-title":"Randomized Algorithms","author":"R Motwani","year":"2010","unstructured":"Motwani, R., Raghavan, P.: Randomized Algorithms. Chapman & Hall\/CRC, London (2010)"},{"key":"5_CR20","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: bringing order to the web. Technical report 1999-66, Stanford InfoLab (1999)"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Rao, A., Spasojevic, N., Li, Z., DSouza, T.: Klout score: measuring influence across multiple social networks. In: Big Data, pp. 2282\u20132289. IEEE (2015)","DOI":"10.1109\/BigData.2015.7364017"},{"issue":"12","key":"5_CR22","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P Resnick","year":"2000","unstructured":"Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Commun. ACM 43(12), 45\u201348 (2000)","journal-title":"Commun. ACM"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Srivatsa, M., Xiong, L., Liu, L.: TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. In: WWW, pp. 422\u2013431. ACM (2005)","DOI":"10.1145\/1060745.1060808"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Uysal, I., Croft, W.B.: User oriented tweet ranking: a filtering approach to microblogs. In: ACM CIKM, pp. 2261\u20132264. ACM (2011)","DOI":"10.1145\/2063576.2063941"},{"key":"5_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/978-3-642-29038-1_29","volume-title":"Database Systems for Advanced Applications","author":"J Vosecky","year":"2012","unstructured":"Vosecky, J., Leung, K.W.-T., Ng, W.: Searching for quality microblog posts: filtering and ranking based on content analysis and implicit links. In: Lee, S., Peng, Z., Zhou, X., Moon, Y.-S., Unland, R., Yoo, J. (eds.) DASFAA 2012, Part I. LNCS, vol. 7238, pp. 397\u2013413. Springer, Heidelberg (2012)"},{"key":"5_CR26","unstructured":"Wang, A.H.: Don\u2019t follow me: spam detection in Twitter. In: SECRYPT, pp. 1\u201310. IEEE (2010)"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Weng, J., Lim, E.P., Jiang, J., He, Q.: TwitterRank: finding topic-sensitive influential twitterers. In: ACM WSDM, pp. 261\u2013270. ACM (2010)","DOI":"10.1145\/1718487.1718520"},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-642-17616-6_22","volume-title":"Web Information Systems Engineering \u2013 WISE 2010","author":"Y Yamaguchi","year":"2010","unstructured":"Yamaguchi, Y., Takahashi, T., Amagasa, T., Kitagawa, H.: TURank: Twitter user ranking based on user-tweet graph analysis. In: Chen, L., Triantafillou, P., Suel, T. (eds.) WISE 2010. LNCS, vol. 6488, pp. 240\u2013253. Springer, Heidelberg (2010)"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: SybilLimit: a near-optimal social network defense against sybil attacks. In: IEEE S&P, pp. 3\u201317 (2008)","DOI":"10.1109\/SP.2008.13"},{"issue":"3","key":"5_CR30","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1109\/TNET.2008.923723","volume":"16","author":"H Yu","year":"2008","unstructured":"Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.D.: SybilGuard: defending against sybil attacks via social networks. IEEE\/ACM Trans. Netw. 16(3), 576\u2013589 (2008)","journal-title":"IEEE\/ACM Trans. Netw."}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2016"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48743-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T16:28:55Z","timestamp":1712075335000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-48743-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319487427","9783319487434"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48743-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"2 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.wise-conferences.org\/2016\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}