{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:50:04Z","timestamp":1725529804186},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642006715"},{"type":"electronic","value":"9783642006722"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00672-2_70","type":"book-chapter","created":{"date-parts":[[2009,3,21]],"date-time":"2009-03-21T17:04:48Z","timestamp":1237655088000},"page":"677-682","source":"Crossref","is-referenced-by-count":0,"title":["DepRank: A Probabilistic Measure of Dependence via Heterogeneous Links"],"prefix":"10.1007","author":[{"given":"Pei","family":"Li","sequence":"first","affiliation":[]},{"given":"Bo","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Hongyan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jun","family":"He","sequence":"additional","affiliation":[]},{"given":"Xiaoyong","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"18","key":"70_CR1","doi-asserted-by":"publisher","first-page":"2015","DOI":"10.1093\/bioinformatics\/btn373","volume":"24","author":"L. Chen","year":"2008","unstructured":"Chen, L., Tong, T., Zhao, H.: Considering dependence among genes and markers for false discovery control in eQTL mapping. Bioinformatics\u00a024(18), 2015\u20132022 (2008)","journal-title":"Bioinformatics"},{"key":"70_CR2","doi-asserted-by":"crossref","unstructured":"Liu, C., Chen, C., Han, J., Yu, P.S.: GPLAG: detection of software plagiarism by program dependence graph analysis. In: KDD 2006, pp. 872\u2013881 (2006)","DOI":"10.1145\/1150402.1150522"},{"key":"70_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/978-3-540-73871-8_40","volume-title":"Advanced Data Mining and Applications","author":"N. Memon","year":"2007","unstructured":"Memon, N., Hicks, D.L., Larsen, H.L.: How investigative data mining can help intelligence agencies to discover dependence of nodes in terrorist networks. In: Alhajj, R., Gao, H., Li, X., Li, J., Za\u00efane, O.R. (eds.) ADMA 2007. LNCS, vol.\u00a04632, pp. 430\u2013441. Springer, Heidelberg (2007)"},{"issue":"2","key":"70_CR4","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1137\/S0895480193260595","volume":"9","author":"D. Coppersmith","year":"1996","unstructured":"Coppersmith, D., Feige, U., Shearer, J.B.: Random Walks on Regular and Irregular Graphs. SIAM J. Discrete Math (SIAMDM)\u00a09(2), 301\u2013308 (1996)","journal-title":"SIAM J. Discrete Math. (SIAMDM)"},{"key":"70_CR5","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn., pp. 540\u2013549. MIT Press and McGraw-Hill (2001)"},{"issue":"2","key":"70_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1117454.1117456","volume":"7","author":"L. Getoor","year":"2005","unstructured":"Getoor, L., Diehl, C.P.: Link mining: a survey. SIGKDD Explorations (SIGKDD)\u00a07(2), 3\u201312 (2005)","journal-title":"SIGKDD Explorations (SIGKDD)"},{"key":"70_CR7","unstructured":"The Free Dictionary, \n                    \n                      http:\/\/www.thefreedictionary.com\/dependence"},{"key":"70_CR8","doi-asserted-by":"crossref","unstructured":"Jeh, G., Widom, J.: SimRank: A measure of structural-context similarity. In: SIGKDD 2002, pp. 538\u2013543 (2002)","DOI":"10.1145\/775047.775126"},{"issue":"8","key":"70_CR9","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1109\/TCS.1978.1084515","volume":"25","author":"F. Rubin","year":"1978","unstructured":"Rubin, F.: Enumerating all simple paths in a graph. IEEE Transactions on Circuits and Systems\u00a025(8), 641\u2013642 (1978)","journal-title":"IEEE Transactions on Circuits and Systems"}],"container-title":["Lecture Notes in Computer Science","Advances in Data and Web Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00672-2_70","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T05:40:24Z","timestamp":1551937224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00672-2_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642006715","9783642006722"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00672-2_70","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}