{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:26:09Z","timestamp":1742912769349,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319509006"},{"type":"electronic","value":"9783319509013"}],"license":[{"start":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T00:00:00Z","timestamp":1480464000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50901-3_37","type":"book-chapter","created":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T05:02:04Z","timestamp":1480482124000},"page":"459-471","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Approach to Predict Retweets and Replies Based on Privacy and Complexity-Aware Feature Planes"],"prefix":"10.1007","author":[{"given":"Kamini","family":"Garg","sequence":"first","affiliation":[]},{"given":"Valerio","family":"Arnaboldi","sequence":"additional","affiliation":[]},{"given":"Silvia","family":"Giordano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,30]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Arnaboldi, V., Conti, M., Passarella, A., Pezzoni, F.: Ego networks in twitter: an experimental analysis. In: Proceedings of IEEE INFOCOM, pp. 3459\u20133464 (2013)","DOI":"10.1109\/INFCOM.2013.6567181"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Boyd, D., Golder, S., Lotan, G.: Tweet, tweet, retweet: Conversational aspects of retweeting on twitter. In: System Sciences (HICSS), 2010 43rd Hawaii International Conference on, pp. 1\u201310. IEEE (2010)","DOI":"10.1109\/HICSS.2010.412"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Chen, K., Chen, T., Zheng, G., Jin Ou and Yao, E., Yu, Y.: Collaborative personalized tweet recommendation. In: Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval, pp. 661\u2013670 (2012)","DOI":"10.1145\/2348283.2348372"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, J.C., Adamic, L., Dow, A.P., Kleinberg, H.M., Leskovec, J.: Can cascades be predicted? In: Proceedings of the 23rd international conference on World wide web, pp. 925\u2013936 (2014)","DOI":"10.1145\/2566486.2567997"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Ferrara, E., Yang, Z.: Quantifying the effect of sentiment on information diffusion in social media. In: ArXiv preprints (2015)","DOI":"10.7717\/peerj-cs.26"},{"key":"37_CR6","unstructured":"Galuba, W., Aberer, K., Chakraborty, D., Despotovic, Z., Kellerer, W.: Outtweeting the twitterers - predicting information cascades in microblogs. In: Proceedings of the 3rd Wonference on Online social networks, pp. 3\u20133 (2010)"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Gan, D., Jenkins, L.R.: Social networking privacywhos stalking you? Future Internet 7(1), 67\u201393 (2015)","DOI":"10.3390\/fi7010067"},{"key":"37_CR8","unstructured":"Hoang, T.A., Lim, E.P.: Virality and susceptibility in information diffusions. In: Sixth International AAAI Conference on Weblogs and Social Media (2012)"},{"key":"37_CR9","unstructured":"Hong, L., Doumith, A., Davison, B.D.: Personalized retweet prediction in twitter. In: 4th Workshop on Information in Networks (2012)"},{"key":"37_CR10","unstructured":"Kelley, P.G., Cranshaw, J.: Conducting research on twitter: A call for guidelines and metrics (2013)"},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Martin, T., Hofman, J.M., Sharma, A., Anderson, A.,Watts, D.J.: Exploring limits to prediction in complex social systems. In: Proceedings of the 25th International Conference on World Wide Web, pp. 683\u2013694 (2016)","DOI":"10.1145\/2872427.2883001"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Myers, S.A., Zhu, C., Leskovec, J.: Information diffusion and external influence in networks. In: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 33\u201341 (2012)","DOI":"10.1145\/2339530.2339540"},{"key":"37_CR13","unstructured":"Petrovic, S., Osborne, M., Lavrenko, V.: Rt to win! predicting message propagation in twitter. In: ICWSM (2011)"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Pezzoni, F., An, J., Passarella, A., Crowcroft, J., Conti, M.: Why do i retweet it? an information propagation model for microblogs. In: Proceedings of the 5th International Conference on Social Informatics, pp. 360\u2013369 (2013)","DOI":"10.1007\/978-3-319-03260-3_31"},{"key":"37_CR15","doi-asserted-by":"crossref","unstructured":"Salganik, M.J., Dodds, P.S., Watts, D.J.: Experimental study of inequality and unpredictability in an artificial cultural market. Science 311(5762), 854\u2013856 (2006)","DOI":"10.1126\/science.1121066"},{"key":"37_CR16","doi-asserted-by":"crossref","unstructured":"Yang, J., Counts, S.: Predicting the speed, scale, and range of information diffusion in twitter. In: In 4th International AAAI Conference on Weblogs and Social Media (2010)","DOI":"10.1609\/icwsm.v4i1.14039"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Yuan, N.J., Zhong, Y., Zhang, F., Xie, X., Lin, C.Y., Rui, Y.: Who will reply to\/retweet this tweet?: The dynamics of intimacy from online social interactions. In: Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, pp. 3\u201312 (2016)","DOI":"10.1145\/2835776.2835800"}],"container-title":["Studies in Computational Intelligence","Complex Networks &amp; Their Applications V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50901-3_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T03:34:20Z","timestamp":1692588860000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50901-3_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,30]]},"ISBN":["9783319509006","9783319509013"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50901-3_37","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2016,11,30]]}}}