{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T13:22:20Z","timestamp":1725974540349},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319901039"},{"type":"electronic","value":"9783319901046"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-90104-6_9","type":"book-chapter","created":{"date-parts":[[2018,4,17]],"date-time":"2018-04-17T16:53:22Z","timestamp":1523984002000},"page":"133-147","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Framework Based on MSVL for Verifying Probabilistic Properties in Social Networks"],"prefix":"10.1007","author":[{"given":"Xiaobing","family":"Wang","sequence":"first","affiliation":[]},{"given":"Liyuan","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xinfeng","family":"Shu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,18]]},"reference":[{"unstructured":"Zhang, J., Liu, B., Tang, J., et al.: Social influence locality for modeling retweeting behaviors. In: International Joint Conference on Artificial Intelligence, pp. 2761\u20132767. AAAI Press (2013)","key":"9_CR1"},{"key":"9_CR2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-3926-3","volume-title":"Social Network Engineering for Secure Web Data and Services","author":"L Caviglione","year":"2013","unstructured":"Caviglione, L., Coccoli, M., Merlo, A.: Social Network Engineering for Secure Web Data and Services. IGI Global, Hershey (2013)"},{"doi-asserted-by":"crossref","unstructured":"Ding, J., Cruz, I., Li, C.: A formal model for building a social network. In: IEEE International Conference on Service Operations, Logistics, and Informatics, pp. 237\u2013242. IEEE Press, New York (2011)","key":"9_CR3","DOI":"10.1109\/SOLI.2011.5986562"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-319-31220-0_9","volume-title":"Structured Object-Oriented Formal Language and Method","author":"X Wang","year":"2016","unstructured":"Wang, X., Sun, T.: A method based on MSVL for verification of the social network privacy policy. In: Liu, S., Duan, Z. (eds.) SOFL+MSVL 2015. LNCS, vol. 9559, pp. 118\u2013131. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-31220-0_9"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MASSP.1986.1165342","volume":"3","author":"L Rabiner","year":"1986","unstructured":"Rabiner, L., Juang, B.: An introduction to hidden Markov models. IEEE ASSP Mag. 3, 4\u201316 (1986)","journal-title":"IEEE ASSP Mag."},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1007\/s11704-016-6059-4","volume":"11","author":"X Wang","year":"2017","unstructured":"Wang, X., Tian, C., Duan, Z., Zhao, L.: MSVL: a typed language for temporal logic programming. Front. Comput. Sci. 11, 762\u2013785 (2017)","journal-title":"Front. Comput. Sci."},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s00236-007-0062-z","volume":"45","author":"Z Duan","year":"2008","unstructured":"Duan, Z., Tian, C., Zhang, L.: A decision procedure for propositional projection temporal logic with infinite models. Acta Inform. 45, 43\u201378 (2008)","journal-title":"Acta Inform."},{"unstructured":"Tang, J., Chang, Y., Liu, H.: Mining social media with social theories: a survey. In: Applied Computing, Second Asian Applied Computing Conference, pp. 29\u201331. AACC, Nepal (2004)","key":"9_CR8"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"M Granovetter","year":"1973","unstructured":"Granovetter, M.: The strength of weak ties. Am. J. Sociol. 78, 1360\u20131380 (1973)","journal-title":"Am. J. Sociol."},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1109\/TSE.2003.1205180","volume":"29","author":"C Baier","year":"2003","unstructured":"Baier, C., Haverkort, B., Hermanns, H., et al.: Model-checking algorithms for continuous-time Markov chains. IEEE Trans. Softw. Eng. 29, 524\u2013541 (2003)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-540-72522-0_6","volume-title":"Formal Methods for Performance Evaluation","author":"M Kwiatkowska","year":"2007","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: Stochastic model checking. In: Bernardo, M., Hillston, J. (eds.) SFM 2007. LNCS, vol. 4486, pp. 220\u2013270. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-72522-0_6"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-21455-4_3","volume-title":"Formal Methods for Eternal Networked Software Systems","author":"Vojt\u011bch Forejt","year":"2011","unstructured":"Forejt, V., Kwiatkowska, M., Norman, G., et al.: Automated verification techniques for probabilistic systems. In: International School on Formal Methods for the Design of Computer, Communication and Software Systems, pp. 53\u2013113. Advanced Lectures, Bertinoro (2011)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-540-72522-0_3","volume-title":"Formal Methods for Performance Evaluation","author":"G Balbo","year":"2007","unstructured":"Balbo, G.: Introduction to generalized stochastic Petri nets. In: Bernardo, M., Hillston, J. (eds.) SFM 2007. LNCS, vol. 4486, pp. 83\u2013131. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-72522-0_3"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-540-24611-4_5","volume-title":"Validation of Stochastic Systems","author":"F Ciesinski","year":"2004","unstructured":"Ciesinski, F., Gr\u00f6\u00dfer, M.: On probabilistic computation tree logic. In: Baier, C., Haverkort, B.R., Hermanns, H., Katoen, J.-P., Siegle, M. (eds.) Validation of Stochastic Systems. LNCS, vol. 2925, pp. 147\u2013188. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-24611-4_5"},{"unstructured":"Yang, X.: Probabilistic model checking on propositional projection temporal logic. In: IMECS 2011. LNECS, vol. 2188, pp. 242\u2013248 (2011)","key":"9_CR15"}],"container-title":["Lecture Notes in Computer Science","Structured Object-Oriented Formal Language and Method"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-90104-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,17]],"date-time":"2018-04-17T16:56:45Z","timestamp":1523984205000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-90104-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319901039","9783319901046"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-90104-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}