{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T07:57:51Z","timestamp":1648627071170},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,6,29]],"date-time":"2011-06-29T00:00:00Z","timestamp":1309305600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s13278-011-0032-x","type":"journal-article","created":{"date-parts":[[2011,6,29]],"date-time":"2011-06-29T15:28:01Z","timestamp":1309361281000},"page":"39-52","source":"Crossref","is-referenced-by-count":13,"title":["Social positions and simulation relations"],"prefix":"10.1007","volume":"2","author":[{"given":"Joel","family":"Brynielsson","sequence":"first","affiliation":[]},{"given":"Lisa","family":"Kaati","sequence":"additional","affiliation":[]},{"given":"Pontus","family":"Svenson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,29]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Abdallah S (2011) Generalizing unweighted network measures to capture the focus in interactions. Soc Netw Anal Min. doi: 10.1007\/s13278-011-0018-8","DOI":"10.1007\/s13278-011-0018-8"},{"key":"32_CR2","unstructured":"Agrell W, Treverton GF (2009) The science of intelligence: reflections on a field that never was. In: Treverton GF, Agrell W (eds) National intelligence systems: current research and future prospects. Cambridge University Press, New York, chap 11, pp 265\u2013280"},{"key":"32_CR3","unstructured":"Armistead L (ed) (2004) Information operations: warfare and the hard reality of soft power. Issues in Twenty-First Century Warfare, Brassey\u2019s, Inc., Washington"},{"key":"32_CR4","unstructured":"Brynielsson J, Horndahl A, Kaati L, M\u00e5rtenson C, Svenson P (2009) Development of computerized support tools for intelligence work. In: 14th ICCRTS, Washington"},{"issue":"1\u20133","key":"32_CR5","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.tcs.2007.11.018","volume":"393","author":"P Buchholz","year":"2008","unstructured":"Buchholz P (2008) Bisimulation relations for weighted automata. Theor Comput Sci 393(1\u20133):109\u2013123","journal-title":"Theor Comput Sci"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Bustan D, Grumberg O (2000) Simulation based minimization. In: Conference on automated deduction, pp 255\u2013270","DOI":"10.1007\/10721959_20"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Carrington PJ, Scott J, Wasserman S (eds)(2005) Models and methods in social network analysis. Cambridge University Press, New York","DOI":"10.1017\/CBO9780511811395"},{"key":"32_CR8","unstructured":"Clark RM (2004) Intelligence analysis: a target-centric approach. CQ Press, Washington"},{"key":"32_CR9","unstructured":"Cross R, Parker A (2004) The hidden power of social networks: understanding how work really gets done in organizations. Harvard Business School Press, Boston"},{"key":"32_CR10","unstructured":"DeRosa M (2004) Data mining and data analysis for counterterrorism. CSIS Press, Washington"},{"issue":"1","key":"32_CR11","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/0022250X.1994.9990134","volume":"19","author":"MG Everett","year":"1994","unstructured":"Everett MG, Borgatti SP (1994) Regular equivalence: general theory. J Math Soc 19(1):29\u201352","journal-title":"J Math Soc"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Fazeen M, Dantu R, Guturu P (2011) Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches. Soc Netw Anal Min. doi: 10.1007\/s13278-011-0017-9","DOI":"10.1007\/s13278-011-0017-9"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Ferrara L, M\u00e5rtenson C, Svenson P, Svensson P, Hidalgo J, Molano A, Madsen A (2008) Integrating data sources and network analysis tools to support the fight against organized crime. Lecture Notes in Computer Science, vol 5075. Springer, Berlin, pp 171\u2013182","DOI":"10.1007\/978-3-540-69304-8_18"},{"key":"32_CR14","unstructured":"Francesco R, Francesco T (2007) A new efficient simulation equivalence algorithm. In: LICS \u201907: Proceedings of the 22nd annual IEEE symposium on logic in computer science, pp 171\u2013180"},{"key":"32_CR23","unstructured":"Freeman LC, White DR, Romney AK (eds) (1992) Research methods in social network analysis. Transaction Publishers, New Brunswick"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Gentilini R, Piazza C, Policriti A (2002) Simulation as coarsest partition problem. In: Tools and algorithms for construction and analysis of systems, pp 415\u2013430","DOI":"10.1007\/3-540-46002-0_29"},{"key":"32_CR16","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1023\/A:1027328830731","volume":"31","author":"R Gentilini","year":"2003","unstructured":"Gentilini R, Piazza C, Policriti A (2003) From bisimulation to simulation: coarsest partition problems. J Autom Reason 31:73\u2013103","journal-title":"J Autom Reason"},{"key":"32_CR17","unstructured":"Hanneman RA, Riddle M (2005) Introduction to social network methods. University of California, Riverside, chap 12"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Henzinger MR, Henzinger TA, Kopke PW (1995) Computing simulations on finite and infinite graphs. In: Proceedings of the 36th annual symposium on foundations of computer science. IEEE Computer Society Press, pp 453\u2013462","DOI":"10.1109\/SFCS.1995.492576"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"H\u00f6gberg J, Maletti A, May J (2007) Bisimulation minimisation for weighted tree automata. In: Proceedings of 11th international conference developments in language theory. Lecture Notes in Computer Science, vol 4588, Springer, Berlin, pp 229\u2013241","DOI":"10.1007\/978-3-540-73208-2_23"},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"Hopcroft J (1971) An $$n\\textrm{log} n$$ algorithm for minimizing states in a finite automaton. In: Kohavi Z (ed) Theory of machines and computations, Academic Press, New York","DOI":"10.1016\/B978-0-12-417750-5.50022-1"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Kolaczyk ED (2009) Statistical analysis of network data: methods and models. Springer Series in Statistics. Springer, New York","DOI":"10.1007\/978-0-387-88146-1"},{"key":"32_CR22","unstructured":"Liggins ME, Hall DL, Llinas J (eds) (2009) Handbook of multisensor data fusion: theory and practice, 2nd edn. Electrical Engineering and Applied Signal Processing Series. CRC Press, Boca Raton"},{"issue":"2","key":"32_CR24","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1006\/inco.1995.1134","volume":"121","author":"N Lynch","year":"1995","unstructured":"Lynch N, Vaandrager F (1995) Forward and backward simulations: I. Untimed systems. Inf Comput 121(2):214\u2013233","journal-title":"Inf Comput"},{"key":"32_CR25","doi-asserted-by":"crossref","unstructured":"Maletti A (2009) A backward and a forward simulation for weighted tree automata. In: Proceedings of 3rd international conference algebraic informatics","DOI":"10.1007\/978-3-642-03564-7_19"},{"key":"32_CR26","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/S0378-8733(02)00036-9","volume":"25","author":"M Marx","year":"2003","unstructured":"Marx M, Masuch M (2003) Regular equivalence and dynamic logic. Soc Netw 25:51\u201365","journal-title":"Soc Netw"},{"key":"32_CR27","unstructured":"Newman M, Barabasi A, Watts DJ (eds) (2006) The structure and dynamics of networks. Princeton University Press, Princeton"},{"issue":"2","key":"32_CR28","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.socnet.2009.02.002","volume":"31","author":"T Opsahl","year":"2009","unstructured":"Opsahl T, Panzarasa P (2009) Clustering in weighted networks. Soc Netw 31(2):155\u2013163","journal-title":"Soc Netw"},{"issue":"6","key":"32_CR29","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1137\/0216062","volume":"16","author":"R Paige","year":"1987","unstructured":"Paige R, Tarjan R (1987) Three partition refinement algorithms. SIAM J Comput 16(6):973\u2013989","journal-title":"SIAM J Comput"},{"key":"32_CR30","unstructured":"Pollard NA (2009) On counterterrorism and intelligence. In: Treverton GF, Agrell W (eds) National intelligence systems: current research and future prospects. Cambridge University Press, New York, chap 6, pp 117\u2013146"},{"key":"32_CR31","unstructured":"Scott J (2000) Social network analysis: a Handbook, 2nd edn. Sage Publications, London"},{"key":"32_CR32","doi-asserted-by":"crossref","unstructured":"Tan L, Cleaveland R (2001) Simulation revisited. Lecture Notes in Computer Science, vol 2031, pp 480\u2013495","DOI":"10.1007\/3-540-45319-9_33"},{"key":"32_CR33","doi-asserted-by":"crossref","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge","DOI":"10.1017\/CBO9780511815478"},{"issue":"1","key":"32_CR34","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s13278-010-0014-4","volume":"1","author":"AW Wolfe","year":"2011","unstructured":"Wolfe AW (2011) Anthropologist view of social network analysis and data mining. Soc Netw Anal Min 1(1):3\u201319","journal-title":"Soc Netw Anal Min"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-011-0032-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-011-0032-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-011-0032-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T14:16:59Z","timestamp":1560349019000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-011-0032-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,29]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["32"],"URL":"https:\/\/doi.org\/10.1007\/s13278-011-0032-x","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6,29]]}}}