{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T23:28:03Z","timestamp":1769556483069,"version":"3.49.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,12,10]],"date-time":"2013-12-10T00:00:00Z","timestamp":1386633600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s11280-013-0271-z","type":"journal-article","created":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T07:32:28Z","timestamp":1386574348000},"page":"731-747","source":"Crossref","is-referenced-by-count":9,"title":["Finding critical blocks of information diffusion in social networks"],"prefix":"10.1007","volume":"18","author":[{"given":"Ende","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Guoren","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kening","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Ge","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,10]]},"reference":[{"key":"271_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-8462-3","volume-title":"Social Network Data Analytics","author":"CC Aggarwal","year":"2011","unstructured":"Aggarwal, C.C., et al: Social Network Data Analytics. Springer, Germany (2011)"},{"key":"271_CR2","doi-asserted-by":"crossref","unstructured":"Ahuja, G.: Collaboration networks, structural holes, and innovation: a longitudinal study. Administrative Science Quarterly 45, 425\u2013455 (2000)","DOI":"10.2307\/2667105"},{"key":"271_CR3","volume-title":"Graphs and Matrices","author":"RB Bapat","year":"2011","unstructured":"Bapat, R.B.: Graphs and Matrices. Springer, Germany (2011)"},{"key":"271_CR4","doi-asserted-by":"crossref","unstructured":"Barabasi, A.L., Albert, R.: Emergence of scaling in random networks. Scinece 509(286) (1999)","DOI":"10.1126\/science.286.5439.509"},{"issue":"5916","key":"271_CR5","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1126\/science.1165821","volume":"323","author":"SP Borgatti","year":"2009","unstructured":"Borgatti, S.P., Mehra, A., Brass, D.J., Labianca, G.: Network analysis in the social sciences. Science 323(5916), 892\u2013895 (2009)","journal-title":"Science"},{"key":"271_CR6","doi-asserted-by":"crossref","unstructured":"Budak, C., Agrawal, D., Abbadi, A.: Limiting the spread of misinformation in social networks. In: WWW \u201911: International World Wide Web Conference, pp. 497\u2013505. ACM (2011)","DOI":"10.1145\/1963405.1963499"},{"key":"271_CR7","doi-asserted-by":"crossref","DOI":"10.4159\/9780674029095","volume-title":"Structural holes: The Social Structure of Competition","author":"R Burt","year":"1992","unstructured":"Burt, R.: Structural holes: The Social Structure of Competition. Harvard University Press, Cambridge (1992)"},{"issue":"2","key":"271_CR8","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1086\/590674","volume":"114","author":"V Buskens","year":"2008","unstructured":"Buskens, V., van de Rijt, A.: Dynamics of networks if everyone strives for structural hole. Am. J. Sociol. 114(2), 371\u2013407 (2008)","journal-title":"Am. J. Sociol."},{"key":"271_CR9","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1029\u20131038. ACM (2010)","DOI":"10.1145\/1835804.1835934"},{"key":"271_CR10","doi-asserted-by":"crossref","unstructured":"Chung, F.: Spectral graph theory. Number 92 in CBMS Regional Conference Series in Mathematics, Febraryt (1997)","DOI":"10.1090\/cbms\/092"},{"key":"271_CR11","doi-asserted-by":"crossref","unstructured":"Dhillon, I., Guan, Y., Kulis, B.: Kernel k-means: spectral clustering and normalized cuts. In: KDD \u201904: International Conference on Knowledge Discovery and Data Mining, pp. 551\u2013556. ACM (2004)","DOI":"10.1145\/1014052.1014118"},{"key":"271_CR12","doi-asserted-by":"crossref","unstructured":"Fiedler, M.: Algebraic connectivity of graphs. Czechoslov. Math. J. 23(98) (1973)","DOI":"10.21136\/CMJ.1973.101168"},{"issue":"100","key":"271_CR13","doi-asserted-by":"crossref","first-page":"619","DOI":"10.21136\/CMJ.1975.101357","volume":"25","author":"M Fiedler","year":"1975","unstructured":"Fiedler, M.: A property of enginvectors of nonnegative symmetric matrices and its application to graph theory. Czechoslov. Math. J. 25(100), 619\u2013633 (1975)","journal-title":"Czechoslov. Math. J."},{"key":"271_CR14","unstructured":"Garey, M.R., Johnson, D.S.: Computers and intractability: a guide to the theory of NP-Completeness. Bell Telephone Laboratories (1979)"},{"issue":"1","key":"271_CR15","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1137\/S0895479888151111","volume":"15","author":"RG Grime","year":"1992","unstructured":"Grime, R.G., Lewis, J.G., Simon, H.D.: A shifted block lanczos algorithm for solving sparse symmetric generalized eigenproblems. SIAM J. Matrix Anal. Appl. 15(1), 228\u2013272 (1992)","journal-title":"SIAM J. Matrix Anal. Appl."},{"key":"271_CR16","volume-title":"Matrix Computations, 3rd edn","author":"GH Golub","year":"1996","unstructured":"Golub, G.H., Loan, C.F.V.: Matrix Computations, 3rd edn. Johns Hopkins University Press, USA (1996)"},{"key":"271_CR17","doi-asserted-by":"crossref","unstructured":"Gomez-Rodriguez, M., Leskovec, J., Krause, A.: Inferring networks of diffusion and influence. In: KDD \u201910: International Conference on Knowledge Discovery and Data Mining, pp. 1019\u20131028. ACM (2010)","DOI":"10.1145\/1835804.1835933"},{"issue":"1","key":"271_CR18","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1016\/j.jet.2007.01.006","volume":"137","author":"S Goyal","year":"2007","unstructured":"Goyal, S., Vega-Redondo, F.: Structural holes in social networks. J. Econ. Theory 137(1), 460\u2013492 (2007)","journal-title":"J. Econ. Theory"},{"key":"271_CR19","doi-asserted-by":"crossref","unstructured":"Goyal, A., Bonchi, F., Lakshmanan, L.V.S.: A data-based approach to social influence maximization. In: VLDB: Proceedings of the VLDB Endowment, pp. 73\u201384. ACM (2012)","DOI":"10.14778\/2047485.2047492"},{"key":"271_CR20","doi-asserted-by":"crossref","unstructured":"Hagen, L., Kahng, A.B.: New spectral methods for ratio cut partitioning and clustering. IEEE Trans. Comput. Aided Des. 19(2) (1992)","DOI":"10.1109\/43.159993"},{"key":"271_CR21","doi-asserted-by":"crossref","unstructured":"Kargar, M., An, A.: Discovering top-k teams of experts with\/without a leader in social networks. In: CIKM 11: Conference on Information and Knowledge Management, pp. 985\u2013994. ACM (2011)","DOI":"10.1145\/2063576.2063718"},{"key":"271_CR22","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J.M., Tardos, E.: Maximizing the spread of influence through a social network. In: International Conference on Knowledge Discovery and Data Mining. ACM (2003)","DOI":"10.1145\/956750.956769"},{"key":"271_CR23","doi-asserted-by":"crossref","unstructured":"Kleinberg, J., Suri, S., Tardos, E.: Strategic network formation with structural holes. In: EC \u201908: ACM Conference on Electronic Commerce. ACM (2008)","DOI":"10.1145\/1386790.1386835"},{"key":"271_CR24","doi-asserted-by":"crossref","unstructured":"Lappas, T., Liu, K., Terzi, E.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data mining, pp. 467\u2013476. ACM (2009)","DOI":"10.1145\/1557019.1557074"},{"key":"271_CR25","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Backstrom, L., Kleinberg, J.: Meme-tracking and the dynamics of the news cycle. In: KDD \u201907: International Conference on Knowledge Discovery and Data Mining, pp. 497\u2013505. ACM (2007)","DOI":"10.1145\/1557019.1557077"},{"key":"271_CR26","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Krause, A., Guestrin, C., et al: Cost-effective outbreak detection in network. In: KDD \u201907: International Conference on Knowledge Discovery and Data Mining, pp. 420\u2013429. ACM (2007)","DOI":"10.1145\/1281192.1281239"},{"key":"271_CR27","unstructured":"Manguoglu, M.: A highly efficient parallel algorithm for computing the fiedler vector. CoRR, abs\/1003.3689 (2010)"},{"key":"271_CR28","unstructured":"Morozov, E.: Swine flu: Twitter\u2019s power to misinformation. Foreign policy (2009)"},{"key":"271_CR29","unstructured":"Ng, A.Y., Jordan, M.I., Weiss, Y.: On spectral clustreing: analysis and an algorithm. In: NIPS \u201901: Advances in Neural Information Processing Systems. ACM (2001)"},{"key":"271_CR30","doi-asserted-by":"crossref","unstructured":"Pinto, P.C., Thiran, P., Vetterli, M.: Locating the source of diffusion in large-scale networks. Phys. Rev. Lett.Week ending 10 August 2012, PRL 109, 068702. doi: 10.1103\/PhysRevLett.109.068702 (2012)","DOI":"10.1103\/PhysRevLett.109.068702"},{"issue":"1\u20132","key":"271_CR31","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/S0377-0427(00)00391-5","volume":"123","author":"A Sameh","year":"2000","unstructured":"Sameh, A., Tong, Z.: The trace minimization method for the symmetric generalized eigenvalue problem. J. Comput. Appl. Math. 123(1\u20132), 155\u2013175 (2000)","journal-title":"J. Comput. Appl. Math."},{"key":"271_CR32","doi-asserted-by":"crossref","unstructured":"Shi, J., Malik, J.: Normalized cuts and image segmentation. IEEE Trans. Pattern. Anal. Mach. Intell. 22(8) (2000)","DOI":"10.1109\/34.868688"},{"key":"271_CR33","volume-title":"Toward understanding the structure and function of cellular interaction networks. Handbook of Large-Scale Random Networks","author":"J Thakar","year":"2008","unstructured":"Thakar, J., Christensen, C., Albert, R.: Toward understanding the structure and function of cellular interaction networks. Handbook of Large-Scale Random Networks. Springer, Germany (2008)"},{"key":"271_CR34","doi-asserted-by":"crossref","unstructured":"von Luxburg, U.: A tutorial on spectral clustering. Stat. Comput. 17(4) (2007)","DOI":"10.1007\/s11222-007-9033-z"},{"key":"271_CR35","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis","author":"S Wasserman","year":"1994","unstructured":"Wasserman, S., Faust, K.: Social Network Analysis. Cambridge University Press, England (1994)"},{"issue":"6684","key":"271_CR36","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts, D.J., Strogatz, S.: Collective dynamics of small-world networks. Nature 393(6684), 440\u2013442 (1998)","journal-title":"Nature"},{"issue":"2","key":"271_CR37","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1137\/S0895479898334605","volume":"22","author":"K Wu","year":"2000","unstructured":"Wu, K., Simon, H.: Thick-restart lanczos method for large symmetric eigenvalue problems. SIAM J. Matrix Anal. Appl. 22(2), 602\u2013616 (2000)","journal-title":"SIAM J. Matrix Anal. Appl."},{"key":"271_CR38","unstructured":"Zafarani, R., Liu, H.: Social Computing Data Repository at ASU. http:\/\/socialcomputing.asu.edu , Arizona State University, School of Computing, Informatics and Decision Systems Engineering (2009)"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-013-0271-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-013-0271-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-013-0271-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T03:25:25Z","timestamp":1746069925000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-013-0271-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,10]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["271"],"URL":"https:\/\/doi.org\/10.1007\/s11280-013-0271-z","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,10]]}}}