{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:07Z","timestamp":1763468227824},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,7,31]],"date-time":"2014-07-31T00:00:00Z","timestamp":1406764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s13278-014-0219-z","type":"journal-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T08:05:10Z","timestamp":1406707510000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Finding influencers in networks using social capital"],"prefix":"10.1007","volume":"4","author":[{"given":"Karthik","family":"Subbian","sequence":"first","affiliation":[]},{"given":"Dhruv","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Jaideep","family":"Srivastava","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,31]]},"reference":[{"key":"219_CR1","unstructured":"Aggarwal CC, Subbian K (2012) Event detection in social streams. In: SDM, vol 12, SIAM, pp 624\u2013635"},{"issue":"1","key":"219_CR2","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/2601412","volume":"47","author":"C Aggarwal","year":"2014","unstructured":"Aggarwal C, Subbian K (2014) Evolutionary network analysis: a survey. ACM Comput Surv (CSUR) 47(1):10","journal-title":"ACM Comput Surv (CSUR)"},{"key":"219_CR3","unstructured":"Berge C, Minieka E (1973) Graphs and hypergraphs, vol 7. North-Holland Publishing Company, Amsterdam"},{"issue":"1","key":"219_CR4","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.giq.2011.04.004","volume":"29","author":"JC Bertot","year":"2012","unstructured":"Bertot JC, Jaeger PT, Hansen D (2012) The impact of polices on government social media usage: issues, challenges, and recommendations. Gov Inf Q 29(1):30\u201340","journal-title":"Gov Inf Q"},{"key":"219_CR5","doi-asserted-by":"crossref","unstructured":"Burt RS (2005) Brokerage and closure : an introduction to social capital. Oxford University Press, Oxford","DOI":"10.1093\/oso\/9780199249145.001.0001"},{"key":"219_CR6","doi-asserted-by":"crossref","unstructured":"Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: KDD, pp 199\u2013208","DOI":"10.1145\/1557019.1557047"},{"key":"219_CR7","doi-asserted-by":"crossref","unstructured":"Chen W, Wang C, Wang Y (2010) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: KDD, pp 1029\u20131038","DOI":"10.1145\/1835804.1835934"},{"key":"219_CR8","unstructured":"Cormen TH, Leiserson CE, Rivest RL, Stein C (2001) Introduction to algorithms. MIT press, Cambridge"},{"key":"219_CR9","doi-asserted-by":"crossref","unstructured":"Dekker P, Uslaner EM (2001) Social capital and participation in everyday life. Rouledge, London","DOI":"10.4324\/9780203451571"},{"issue":"2","key":"219_CR10","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s001820050070","volume":"27","author":"B Dutta","year":"1998","unstructured":"Dutta B, Nouweland AVD, Tijs S (1998) Link formation in cooperative situtations. Int J Game Theory 27(2):245\u2013256","journal-title":"Int J Game Theory"},{"key":"219_CR11","unstructured":"Estrada E, Rodriguez-Velazquez JA (2005) Complex networks as hypergraphs. arXiv preprint http:\/\/arxiv.org\/abs\/physics\/0505137"},{"key":"219_CR12","unstructured":"Gao J, Zhao Q, Ren W, Swami A, Ramanathan R, Bar-Noy A (2012) Dynamic shortest path algorithms for hypergraphs. In: 10th International symposium on modeling and optimization in mobile, ad hoc and wireless networks (WiOpt), IEEE 2012, pp 238\u2013245"},{"issue":"1","key":"219_CR13","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1016\/j.jet.2007.01.006","volume":"137","author":"S Goyal","year":"2007","unstructured":"Goyal S, Vega-Redondo F (2007) Structural holes in social networks. J Econ Theory 137(1):460\u2013492","journal-title":"J Econ Theory"},{"issue":"1","key":"219_CR14","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1006\/jeth.1996.0108","volume":"71","author":"MO Jackson","year":"1996","unstructured":"Jackson MO, Wolinsky A (1996) A strategic model of social and economic networks. J Econ Theory 71(1):44\u201374","journal-title":"J Econ Theory"},{"issue":"3","key":"219_CR15","first-page":"273","volume":"5","author":"C Johnson","year":"2000","unstructured":"Johnson C, Gilles RP (2000) Spatial social networks. Rev Econ Des 5(3):273\u2013299","journal-title":"Rev Econ Des"},{"key":"219_CR16","doi-asserted-by":"crossref","unstructured":"Kapoor K, Sharma D, Srivastava J (2013) Weighted node degree centrality for hypergraphs. In: IEEE 2nd network science workshop (NSW), pp 152\u2013155","DOI":"10.1109\/NSW.2013.6609212"},{"key":"219_CR17","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg JM, Tardos E (2003) Maximizing the spread of influence through a social network. In: KDD 2003, pp 137\u2013146","DOI":"10.1145\/956750.956769"},{"key":"219_CR18","doi-asserted-by":"crossref","unstructured":"Kimura M, Saito K (2006) Tractable models for information diffusion in social networks. In: KDD, pp 259\u2013271","DOI":"10.1007\/11871637_27"},{"key":"219_CR19","doi-asserted-by":"crossref","unstructured":"Kleinberg J, Suri S, Tardos E, Wexler T (2008) Strategic network formation with structural holes. In: Electronic communication, pp 132\u2013141","DOI":"10.1145\/1386790.1386835"},{"key":"219_CR20","doi-asserted-by":"crossref","unstructured":"Knoke D (1999) Organizational networks and corporate social capital. Kluwer, Baltimore","DOI":"10.1007\/978-1-4615-5027-3_2"},{"key":"219_CR21","doi-asserted-by":"crossref","unstructured":"Leskovec J, Krause A, Guestrin C, Faloutsos C, VanBriesen J, Glance NS (2007) Cost-effective outbreak detection in networks. In: KDD, pp 420\u2013429","DOI":"10.1145\/1281192.1281239"},{"key":"219_CR22","doi-asserted-by":"crossref","unstructured":"Li Y, Liu B, Sarawagi S (eds) Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining, Las Vegas, 24\u201327 August 2008, ACM, New York","DOI":"10.1145\/1401890"},{"issue":"8","key":"219_CR23","doi-asserted-by":"crossref","first-page":"716","DOI":"10.14778\/2212351.2212354","volume":"5","author":"Y Low","year":"2012","unstructured":"Low Y, Bickson D, Gonzalez J, Guestrin C, Kyrola A, Hellerstein JM (2012) Distributed graphlab: a framework for machine learning and data mining in the cloud. Proc VLDB Endow 5(8):716\u2013727","journal-title":"Proc VLDB Endow"},{"key":"219_CR24","unstructured":"Melville P, Subbian K, Perlich C, Lawrence R, Meliksetian E (2010) A predictive perspective on measures of influence in networks. In: Proceedings of the workshop on information in networks"},{"issue":"3","key":"219_CR25","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1287\/moor.2.3.225","volume":"2","author":"RB Myerson","year":"1977","unstructured":"Myerson RB (1977) Graphs and cooperation in games. Math Oper Res 2(3):225\u2013229","journal-title":"Math Oper Res"},{"key":"219_CR26","doi-asserted-by":"crossref","unstructured":"Narayanam R, Narahari Y (2011) Topologies of strategically formed social networks based on a generic value function\u2014allocation rule model. Soc Netw 33:56\u201369","DOI":"10.1016\/j.socnet.2010.10.004"},{"key":"219_CR27","doi-asserted-by":"crossref","unstructured":"Newman ME (2001) Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality. Phys Rev E 64(1):016132","DOI":"10.1103\/PhysRevE.64.016132"},{"key":"219_CR28","unstructured":"Shapley LS (1953) A value for n-person games. In: Kuhn HW, Tucker AW (eds) Contributions to the theory of games, vol. II. Annals of mathematical studies, vol 28, pp 307\u2013317"},{"key":"219_CR29","doi-asserted-by":"crossref","unstructured":"Smith M (2008) Social capital in online communities. In: Workshop on PhD students in information and knowledge management, pp 17\u201324","DOI":"10.1145\/1458550.1458554"},{"key":"219_CR30","unstructured":"Smith M, Giraud-Carrier C, Judkins B (2007) Implicit affinity networks. In: Annual workshop on information technologies and systems, pp 8\u201313"},{"key":"219_CR31","doi-asserted-by":"crossref","unstructured":"Smith M, Giraud-Carrier C, Purser N (2009) Implicity affinity networks and social capital. In: Information technology and management, pp 123\u2013134","DOI":"10.1007\/s10799-009-0057-2"},{"key":"219_CR32","doi-asserted-by":"crossref","unstructured":"Subbian K, Aggarwal CC, Srivastava J, Philip SY (2013) Community detection with prior knowledge. In SDM, SIAM, pp 405\u2013413","DOI":"10.1137\/1.9781611972832.45"},{"key":"219_CR33","doi-asserted-by":"crossref","unstructured":"Subbian K, Aggarwal C, Srivastava J (2013) Content-centric flow mining for influence analysis in social streams. In: CIKM, pp 841\u2013846","DOI":"10.1145\/2505515.2505626"},{"key":"219_CR34","doi-asserted-by":"crossref","unstructured":"Subbian K, Melville P (2011) Supervised rank aggregation for predicting influencers in twitter. In: SocialCom, pp 661\u2013665","DOI":"10.1109\/PASSAT\/SocialCom.2011.167"},{"issue":"4","key":"219_CR35","first-page":"73","volume":"3","author":"X Tang","year":"2012","unstructured":"Tang X, Yang CC (2012) Ranking user influence in healthcare social media. ACM Trans Intell Syst Technol (TIST) 3(4):73","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"key":"219_CR36","unstructured":"USPTO (2014) http:\/\/www.google.com\/googlebooks\/uspto.html . Accessed 28 July 2014"},{"issue":"4","key":"219_CR37","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1140\/epjb\/e2010-00297-8","volume":"77","author":"J-W Wang","year":"2010","unstructured":"Wang J-W, Rong L-L, Deng Q-H, Zhang J-Y (2010) Evolving hypernetwork model. Eur Phys J B 77(4):493\u2013498","journal-title":"Eur Phys J B"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-014-0219-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-014-0219-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-014-0219-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T16:57:42Z","timestamp":1717174662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-014-0219-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,31]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["219"],"URL":"https:\/\/doi.org\/10.1007\/s13278-014-0219-z","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,31]]},"article-number":"219"}}