{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T12:14:47Z","timestamp":1762604087766,"version":"3.41.0"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319687827"},{"type":"electronic","value":"9783319687834"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68783-4_6","type":"book-chapter","created":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T05:08:32Z","timestamp":1507007312000},"page":"75-90","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Dynamic Relationship Building: Exploitation Versus Exploration on a Social Network"],"prefix":"10.1007","author":[{"given":"Bo","family":"Yan","sequence":"first","affiliation":[]},{"given":"Yang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jiamou","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,4]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.socnet.2016.09.005","volume":"49","author":"F Agneessens","year":"2017","unstructured":"Agneessens, F., Borgatti, S.P., Everett, M.G.: Geodesic based centrality: unifying the local and the global. Soc. Netw. 49, 12\u201326 (2017)","journal-title":"Soc. Netw."},{"issue":"2\u20133","key":"6_CR2","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P Auer","year":"2002","unstructured":"Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2\u20133), 235\u2013256 (2002)","journal-title":"Mach. Learn."},{"key":"6_CR3","volume-title":"Network Science","author":"A-L Barab\u00e1si","year":"2016","unstructured":"Barab\u00e1si, A.-L.: Network Science. Cambridge University Press, Cambridge (2016)"},{"issue":"5439","key":"6_CR4","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A-L Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si, A.-L., Albert, R.: Emergence of scaling in random networks. Science 286(5439), 509\u2013512 (1999)","journal-title":"Science"},{"issue":"1","key":"6_CR5","doi-asserted-by":"publisher","first-page":"89","DOI":"10.2105\/AJPH.94.1.89","volume":"94","author":"PS Bearman","year":"2004","unstructured":"Bearman, P.S., Moody, J.: Suicide and friendships among American adolescents. Am. J. Public Health 94(1), 89\u201395 (2004)","journal-title":"Am. J. Public Health"},{"issue":"2","key":"6_CR6","doi-asserted-by":"publisher","first-page":"238","DOI":"10.5465\/amr.2003.9416096","volume":"28","author":"M Benner","year":"2003","unstructured":"Benner, M., Tushman, M.: Exploitation, exploration, and process management: the productivity dilemma revisited. Acad. Manag. Rev. 28(2), 238\u2013256 (2003)","journal-title":"Acad. Manag. Rev."},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/0378-8733(88)90014-7","volume":"10","author":"J Bolland","year":"1988","unstructured":"Bolland, J.: Sorting out centrality: an analysis of the performance of four centrality models in real and simulated networks. Soc. Netw. 10, 233\u2013253 (1988)","journal-title":"Soc. Netw."},{"key":"6_CR8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814068","volume-title":"Random Graphs","author":"B Bollob\u00e1s","year":"2001","unstructured":"Bollob\u00e1s, B.: Random Graphs, 2nd edn. Cambridge University Press, Cambridge (2001)","edition":"2"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1086\/228631","volume":"92","author":"P Bonacich","year":"1987","unstructured":"Bonacich, P.: Power and centrality: a family of measures. Am. J. Sociol. 92, 1170\u20131182 (1987)","journal-title":"Am. J. Sociol."},{"issue":"1","key":"6_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s10588-006-7084-x","volume":"12","author":"S Borgatti","year":"2006","unstructured":"Borgatti, S.: Identifying sets of key players in a social network. Comput. Math. Organ. Theory 12(1), 21\u201334 (2006)","journal-title":"Comput. Math. Organ. Theory"},{"key":"6_CR11","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780199249145.001.0001","volume-title":"Brokerage and Closure: An Introduction to Social Capital","author":"R Burt","year":"2005","unstructured":"Burt, R.: Brokerage and Closure: An Introduction to Social Capital. Oxford University Press, Oxford (2005)"},{"key":"6_CR12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511761942","volume-title":"Networks, Crowds, and Markets: Reasoning About a Highly Connected World","author":"D Easley","year":"2010","unstructured":"Easley, D., Kleinberg, J.: Networks, Crowds, and Markets: Reasoning About a Highly Connected World. Cambridge University Press, Cambridge (2010)"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"L Freeman","year":"1979","unstructured":"Freeman, L.: Centrality in social networks: conceptual clarification. Soc. Netw. 1, 215\u2013239 (1979)","journal-title":"Soc. Netw."},{"issue":"3","key":"6_CR14","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1017\/nws.2015.10","volume":"3","author":"M G\u00e9nois","year":"2015","unstructured":"G\u00e9nois, M., Vestergaard, C., Fournet, J., Panisson, A., Bonmarin, I., Barrat, A.: Data on face-to-face contacts in an office building suggest a low-cost vaccination strategy based on community linkers. Netw. Sci. 3(3), 326\u2013347 (2015)","journal-title":"Netw. Sci."},{"issue":"5","key":"6_CR15","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1177\/0022002702046005006","volume":"46","author":"KS Gleditsch","year":"2002","unstructured":"Gleditsch, K.S.: Expanded trade and GDP data. J. Conflict Resolut. 46(5), 712\u2013724 (2002)","journal-title":"J. Conflict Resolut."},{"issue":"6","key":"6_CR16","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"M Granovetter","year":"1973","unstructured":"Granovetter, M.: The strength of weak ties. Am. J. Sociol. 78(6), 1360\u20131380 (1973)","journal-title":"Am. J. Sociol."},{"issue":"3","key":"6_CR17","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1086\/228311","volume":"91","author":"M Granovetter","year":"1985","unstructured":"Granovetter, M.: Economic action and social structure: the problem of embeddedness. Am. J. Sociol. 91(3), 481\u2013510 (1985)","journal-title":"Am. J. Sociol."},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1002\/(SICI)1097-0266(199804)19:4<293::AID-SMJ982>3.0.CO;2-M","volume":"19","author":"R Gulati","year":"1998","unstructured":"Gulati, R.: Alliances and networks. Strateg. Manag. J. 19, 293\u2013317 (1998)","journal-title":"Strateg. Manag. J."},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.jtbi.2010.11.033","volume":"271","author":"L Isella","year":"2011","unstructured":"Isella, L., Stehl\u00e9, J., Barrat, A., Cattuto, C., Pinton, J.-F., den Broeck, W.V.: What in a crowd? Analysis of face-to-face behavioral networks. J. Theoret. Biol. 271, 166\u2013180 (2011)","journal-title":"J. Theoret. Biol."},{"key":"6_CR20","volume-title":"A Survey of Models of Network Formation: Stability and Efficiency","author":"M Jackson","year":"2005","unstructured":"Jackson, M.: A Survey of Models of Network Formation: Stability and Efficiency. Group Formation in Economics. Cambridge University Press, Cambridge (2005). pp. 11\u201357"},{"issue":"3","key":"6_CR21","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1257\/aer.97.3.890","volume":"97","author":"M Jackson","year":"2007","unstructured":"Jackson, M., Rogers, B.: Meeting strangers and friends of friends: how random are social networks? Am. Econ. Rev. 97(3), 890\u2013915 (2007)","journal-title":"Am. Econ. Rev."},{"issue":"50","key":"6_CR22","doi-asserted-by":"publisher","first-page":"15277","DOI":"10.1073\/pnas.1520970112","volume":"112","author":"MO Jackson","year":"2015","unstructured":"Jackson, M.O., Nei, S.: Networks of military alliances, wars, and international trade. Proc. Nat. Acad. Sci. USA 112(50), 15277\u201315284 (2015)","journal-title":"Proc. Nat. Acad. Sci. USA"},{"issue":"1","key":"6_CR23","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.jcps.2009.10.001","volume":"20","author":"SH Lee","year":"2010","unstructured":"Lee, S.H., Cotte, J., Noseworthy, T.J.: The role of network centrality in the flow of consumer influence. J. Consum. Psychol. 20(1), 66\u201377 (2010)","journal-title":"J. Consum. Psychol."},{"unstructured":"Liu, J., Li, L., Russell, K.: What becomes of the broken hearted? An agent-based approach to self-evaluation, interpersonal loss, and suicide ideation. In: Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, pp. 436\u2013445. International Foundation for Autonomous Agents and Multiagent Systems (2017)","key":"6_CR24"},{"issue":"1","key":"6_CR25","first-page":"106:1","volume":"6","author":"J Liu","year":"2016","unstructured":"Liu, J., Moskvina, A.: Hierarchies, ties and power in organizational networks: model and analysis. Soci. Netw. Anal. Min. 6(1), 106:1\u2013106:26 (2016)","journal-title":"Soci. Netw. Anal. Min."},{"doi-asserted-by":"crossref","unstructured":"Liu, J., Wei, Z.: Network, popularity and social cohesion: a game-theoretic approach. In: AAAI, pp. 600\u2013606 (2017)","key":"6_CR26","DOI":"10.1609\/aaai.v31i1.10568"},{"issue":"6","key":"6_CR27","doi-asserted-by":"publisher","first-page":"1150","DOI":"10.1016\/j.physa.2010.11.027","volume":"390","author":"L L\u00fc","year":"2011","unstructured":"L\u00fc, L., Zhou, T.: Link prediction in complex networks: a survey. Physica A 390(6), 1150\u20131170 (2011)","journal-title":"Physica A"},{"issue":"6","key":"6_CR28","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.2307\/3069430","volume":"45","author":"E Morrison","year":"2002","unstructured":"Morrison, E.: Newcomers\u2019 relationships: the role of social network ties during socialization. Acad. Manag. J. 45(6), 1149\u20131160 (2002)","journal-title":"Acad. Manag. J."},{"unstructured":"Moskvina, A., Liu, J.: How to build your network? A structural analysis. In: Proceedings of the IJCAI 2016, pp. 2597\u20132603. AAAI (2016)","key":"6_CR29"},{"key":"6_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-319-42345-6_4","volume-title":"Computational Social Networks","author":"A Moskvina","year":"2016","unstructured":"Moskvina, A., Liu, J.: Integrating networks of equipotent nodes. In: Nguyen, H.T.T., Snasel, V. (eds.) CSoNet 2016. LNCS, vol. 9795, pp. 39\u201350. Springer, Cham (2016). doi:10.1007\/978-3-319-42345-6_4"},{"doi-asserted-by":"crossref","unstructured":"Moskvina, A., Liu, J.: Togetherness: an algorithmic approach to network integration. In: 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 223\u2013230. IEEE (2016)","key":"6_CR31","DOI":"10.1109\/ASONAM.2016.7752239"},{"key":"6_CR32","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1073\/pnas.98.2.404","volume":"98","author":"M Newman","year":"2001","unstructured":"Newman, M.: The structure of scientific collaboration networks. Proc. Natl. Acad. Sci. USA 98, 404\u2013409 (2001)","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"6_CR33","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001","volume-title":"Networks: An Introduction","author":"M Newman","year":"2010","unstructured":"Newman, M.: Networks: An Introduction. Oxford University Press, Oxford (2010)"},{"doi-asserted-by":"crossref","unstructured":"Osugi, T., Deng, K., Scott, S.: Balancing exploration and exploitation: a new algorithm for active machine learning. In: Proceedinsg of the ICDM 2005, pp. 330\u2013337 (2005)","key":"6_CR34","DOI":"10.1109\/ICDM.2005.33"},{"issue":"6","key":"6_CR35","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1086\/230190","volume":"98","author":"JF Padgett","year":"1993","unstructured":"Padgett, J.F., Ansell, C.K.: Robust action and the rise of the medici, 1400\u20131434. Am. J. Sociol. 98(6), 1259\u20131319 (1993)","journal-title":"Am. J. Sociol."},{"issue":"3","key":"6_CR36","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0378-8733(78)90025-4","volume":"1","author":"FR Pitts","year":"1978","unstructured":"Pitts, F.R.: The medieval river trade network of Russia revisited. Soc. Netw. 1(3), 285\u2013292 (1978)","journal-title":"Soc. Netw."},{"key":"6_CR37","doi-asserted-by":"crossref","first-page":"316","DOI":"10.2307\/3069458","volume":"44","author":"RT Sparrowe","year":"2001","unstructured":"Sparrowe, R.T., Liden, R.C., Wayne, S.J., Kraimer, M.L.: Social networks and the performance of individuals and groups. Acad. Manag. J. 44, 316\u2013325 (2001)","journal-title":"Acad. Manag. J."},{"issue":"12","key":"6_CR38","first-page":"53","volume":"83","author":"B Uzzi","year":"2005","unstructured":"Uzzi, B., Dunlap, S.: How to build your network. Harvard Bus. Rev. 83(12), 53\u201360 (2005)","journal-title":"Harvard Bus. Rev."},{"issue":"6684","key":"6_CR39","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts, D.J., Strogatz, S.H.: Collective dynamics of \u2018small-world\u2019 networks. Nature 393(6684), 440\u2013442 (1998)","journal-title":"Nature"},{"unstructured":"Yadav, A., Chan, H., Jiang, A.X., Xu, H., Rice, E., Tambe, M.: Using social networks to aid homeless shelters: dynamic influence maximization under uncertainty. In: Proceedings of the AAMAS 2016, pp. 740\u2013748 (2016)","key":"6_CR40"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68783-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T23:54:47Z","timestamp":1750895687000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-68783-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319687827","9783319687834"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68783-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Puschino","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 October 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.wise-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}