{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T22:25:39Z","timestamp":1740176739724,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,4,27]],"date-time":"2018-04-27T00:00:00Z","timestamp":1524787200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001852","name":"Indo-French Centre for the Promotion of Advanced Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001852","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Data Sci Anal"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s41060-018-0121-2","type":"journal-article","created":{"date-parts":[[2018,4,27]],"date-time":"2018-04-27T07:09:40Z","timestamp":1524812980000},"page":"131-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Easy-Mention: a model-driven mention recommendation heuristic to boost your tweet popularity"],"prefix":"10.1007","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2297-1153","authenticated-orcid":false,"given":"Soumajit","family":"Pramanik","sequence":"first","affiliation":[]},{"given":"Mohit","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Maximilien","family":"Danisch","sequence":"additional","affiliation":[]},{"given":"Qinna","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jean-Loup","family":"Guillaume","sequence":"additional","affiliation":[]},{"given":"Bivas","family":"Mitra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,27]]},"reference":[{"key":"121_CR1","doi-asserted-by":"crossref","unstructured":"Abdullah, S., Wu, X.: An epidemic model for news spreading on twitter. In: 2011 IEEE 23rd International Conference on Tools with Artificial Intelligence, pp. 163\u2013169 (2011)","DOI":"10.1109\/ICTAI.2011.33"},{"key":"121_CR2","doi-asserted-by":"crossref","unstructured":"Bakshy, E., Hofman, J.M., Mason, W.A., Watts, D.J.: Everyone\u2019s an influencer: quantifying influence on twitter. In: Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, ACM, pp. 65\u201374 (2011a)","DOI":"10.1145\/1935826.1935845"},{"key":"121_CR3","unstructured":"Bakshy, E., Hofman, J.M., Mason, W.A., Watts, D.J.: Identifying influencers on twitter. In: Proceedings of the Fourth ACM International Conference on Web Search and Data Mining (WSDM) (2011b)"},{"issue":"5439","key":"121_CR4","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"AL Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si, A.L., Albert, R.: Emergence of scaling in random networks. Science 286(5439), 509\u2013512 (1999)","journal-title":"Science"},{"issue":"3","key":"121_CR5","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1016\/S0378-4371(02)00736-7","volume":"311","author":"AL Barab\u00e1si","year":"2002","unstructured":"Barab\u00e1si, A.L., Jeong, H., N\u00e9da, Z., Ravasz, E., Schubert, A., Vicsek, T.: Evolution of the social network of scientific collaborations. Physica A Stat. Mech. Appl. 311(3), 590\u2013614 (2002)","journal-title":"Physica A Stat. Mech. Appl."},{"key":"121_CR6","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Collaboration, Electronic Messaging, Anti-abuse and Spam Conference (CEAS), vol.\u00a06, p.\u00a012 (2010)"},{"key":"121_CR7","doi-asserted-by":"crossref","unstructured":"Bhowmick, A.K., Gueuning, M., Delvenne, J.C., Lambiotte, R., Mitra. B.: Temporal pattern of (re)tweets reveal cascade migration. In: 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (2017)","DOI":"10.1145\/3110025.3110084"},{"issue":"4","key":"121_CR8","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/BF02293801","volume":"46","author":"RD Bock","year":"1981","unstructured":"Bock, R.D., Aitkin, M.: Marginal maximum likelihood estimation of item parameters: application of an EM algorithm. Psychometrika 46(4), 443\u2013459 (1981)","journal-title":"Psychometrika"},{"issue":"6","key":"121_CR9","doi-asserted-by":"publisher","first-page":"066,123","DOI":"10.1103\/PhysRevE.85.066123","volume":"85","author":"J Borge-Holthoefer","year":"2012","unstructured":"Borge-Holthoefer, J., Rivero, A., Moreno, Y.: Locating privileged spreaders on an online social network. Phys. Rev. E 85(6), 066,123 (2012)","journal-title":"Phys. Rev. E"},{"key":"121_CR10","doi-asserted-by":"crossref","unstructured":"Cha, M., Haddadi, H., Benevenuto, F., Gummadi, P.K.: Measuring user influence in twitter: the million follower fallacy. In: Proceedings of the 4th International AAAI Conference on Weblogs and Social Media (ICWSM), vol.\u00a010, p.\u00a030 (2010)","DOI":"10.1609\/icwsm.v4i1.14033"},{"key":"121_CR11","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 199\u2013208 (2009)","DOI":"10.1145\/1557019.1557047"},{"issue":"5","key":"121_CR12","doi-asserted-by":"publisher","first-page":"055,103","DOI":"10.1103\/PhysRevE.65.055103","volume":"65","author":"Z Dezs\u0151","year":"2002","unstructured":"Dezs\u0151, Z., Barab\u00e1si, A.L.: Halting viruses in scale-free networks. Phys. Rev. E 65(5), 055,103 (2002)","journal-title":"Phys. Rev. E"},{"key":"121_CR13","doi-asserted-by":"crossref","unstructured":"Dickens, L., Molloy, I., Lobo, J., Cheng, P.C., Russo, A.: Learning stochastic models of information flow. In: Proceedings of the 28th IEEE International Conference on Data Engineering (ICDE), pp. 570\u2013581 (2012)","DOI":"10.1109\/ICDE.2012.103"},{"key":"121_CR14","doi-asserted-by":"crossref","unstructured":"Freitas, C.A., Benevenuto, F., Ghosh, S., Veloso, A.: Reverse engineering socialbot infiltration strategies in twitter. In: Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, (ASONAM), pp. 25\u201332 (2015)","DOI":"10.1145\/2808797.2809292"},{"key":"121_CR15","unstructured":"Galuba, W., Aberer, K., Chakraborty, D., Despotovic, Z., Kellerer, W.: Outtweeting the twitterrs\u2014predicting information cascades in microblogs. In: Proceedings of the 3rd Conference on Online Social Networks (WOSN), pp. 3\u201311 (2010)"},{"issue":"3","key":"121_CR16","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1023\/A:1011122126881","volume":"12","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg, J., Libai, B., Muller, E.: Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark. Lett. 12(3), 211\u2013223 (2001)","journal-title":"Mark. Lett."},{"key":"121_CR17","unstructured":"Gomez-Rodriguez, M., Balduzzi, D., Sch\u00f6lkopf, B.: Uncovering the temporal dynamics of diffusion networks. In: Proceedings of the 28th International Conference on Machine Learning (ICML), pp. 561\u2013568 (2011)"},{"key":"121_CR18","doi-asserted-by":"crossref","unstructured":"Gong, Y., Zhang, Q., Sun, X., Huang, X.: Who will you \"@\"? In: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management (CIKM), pp. 533\u2013542 (2015)","DOI":"10.1145\/2806416.2806458"},{"key":"121_CR19","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1038\/srep00197","volume":"1","author":"S Gonz\u00e1lez-Bail\u00f3n","year":"2011","unstructured":"Gonz\u00e1lez-Bail\u00f3n, S., Borge-Holthoefer, J., Rivero, A., Moreno, Y.: The dynamics of protest recruitment through an online network. Sci. Rep. 1, 197 (2011)","journal-title":"Sci. Rep."},{"issue":"12","key":"121_CR20","doi-asserted-by":"publisher","first-page":"128,701","DOI":"10.1103\/PhysRevLett.111.128701","volume":"111","author":"C Granell","year":"2013","unstructured":"Granell, C., G\u00f3mez, S.: Dynamical interplay between awareness and epidemic spreading in multiplex networks. Phys. Rev. Lett. 111(12), 128,701 (2013)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"121_CR21","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter, M.: Threshold models of collective behavior. Am. J. Sociol. 83(6), 1420\u20131443 (1978)","journal-title":"Am. J. Sociol."},{"issue":"4","key":"121_CR22","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1137\/S0036144500371907","volume":"42","author":"HW Hethcote","year":"2000","unstructured":"Hethcote, H.W.: The mathematics of infectious diseases. SIAM Rev. 42(4), 599\u2013653 (2000)","journal-title":"SIAM Rev."},{"key":"121_CR23","doi-asserted-by":"crossref","unstructured":"Howard, P.N., Duffy, A., Freelon, D., Hussain, M.M., Mari, W., Mazaid, M.: Opening closed regimes: what was the role of social media during the Arab spring? Available at SSRN 2595096 (2011)","DOI":"10.2139\/ssrn.2595096"},{"key":"121_CR24","doi-asserted-by":"crossref","unstructured":"Jin, F., Dougherty, E., Saraf, P., Cao, Y., Ramakrishnan, N.: Epidemiological modeling of news and rumors on twitter. In: Proceedings of the 7th Workshop on Social Network Mining and Analysis, ACM, SNAKDD \u201913, pp. 8:1\u20138:9 (2013)","DOI":"10.1145\/2501025.2501027"},{"issue":"5","key":"121_CR25","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1016\/j.chaos.2006.04.022","volume":"34","author":"Y Jin","year":"2007","unstructured":"Jin, Y., Wang, W., Xiao, S.: An sirs model with a nonlinear incidence rate. Chaos Solitons Fractals 34(5), 1482\u20131497 (2007)","journal-title":"Chaos Solitons Fractals"},{"key":"121_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-642-32541-0_26","volume-title":"Knowledge Management and Acquisition for Intelligent Systems","author":"S Kato","year":"2012","unstructured":"Kato, S., Koide, A., Fushimi, T., Saito, K., Motoda, H.: Network analysis of three twitter functions: favorite, follow and mention. In: Richards, D., Kang, B. (eds.) Knowledge Management and Acquisition for Intelligent Systems. Lecture Notes in Computer Science, vol. 7457, pp. 298\u2013312. Springer, Berlin (2012)"},{"key":"121_CR27","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146 (2003)","DOI":"10.1145\/956755.956769"},{"key":"121_CR28","doi-asserted-by":"crossref","unstructured":"Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media? In: Proceedings of the 19th ACM International Conference on World Wide Web (WWW), pp. 591\u2013600 (2010)","DOI":"10.1145\/1772690.1772751"},{"key":"121_CR29","doi-asserted-by":"crossref","unstructured":"Kywe, S.M., Hoang, T.A., Lim, E.P., Zhu, F.: On recommending hashtags in twitter networks. In: Aberer, K., Flache, A., Jager, W., Liu, L., Tang, J., Gu\u00e9ret, C. (eds.) Social Informatics, vol. 7710, pp. 337\u2013350. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-35386-4_25"},{"key":"121_CR30","doi-asserted-by":"crossref","unstructured":"Lee, K., Mahmud, J., Chen, J., Zhou, M., Nichols, J.: Who will retweet this? detecting strangers from twitter to retweet information. In: Proceedings of the 19th ACM International Conference on Intelligent User Interfaces (IUI), pp. 247\u2013256 (2014)","DOI":"10.1145\/2557500.2557502"},{"key":"121_CR31","doi-asserted-by":"crossref","unstructured":"Lerman, K., Ghosh, R.: Information contagion: an empirical study of the spread of news on digg and twitter social networks. In: Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM), vol.\u00a010, pp. 90\u201397 (2010)","DOI":"10.1609\/icwsm.v4i1.14021"},{"key":"121_CR32","doi-asserted-by":"crossref","unstructured":"Leskovec, J., McGlohon, M., Faloutsos, C., Glance, N., Hurst. M.: Patterns of cascading behavior in large blog graphs. In: Proceedings of the 2007 SIAM International Conference on Data Mining, SIAM, pp. 551\u2013556 (2007)","DOI":"10.1137\/1.9781611972771.60"},{"issue":"4","key":"121_CR33","doi-asserted-by":"publisher","first-page":"118","DOI":"10.3390\/info8040118","volume":"8","author":"M Li","year":"2017","unstructured":"Li, M., Wang, X., Gao, K., Zhang, S.: A survey on information diffusion in online social networks: models and methods. Information 8(4), 118 (2017)","journal-title":"Information"},{"key":"121_CR34","doi-asserted-by":"crossref","unstructured":"Li, Q., Song, D., Liao, L., Liu, L.: Personalized mention probabilistic ranking\u2014recommendation on mention behavior of heterogeneous social network. In: Web-Age Information Management: WAIM 2015 International Workshops: HENA, HRSUNE pp. 41\u201352 (2015)","DOI":"10.1007\/978-3-319-23531-8_4"},{"key":"121_CR35","doi-asserted-by":"crossref","unstructured":"Li, Y., Feng, Z., Wang, H., Kong, S., Feng, L.: Retweet P: Modeling and predicting tweets spread using an extended susceptible-infected-susceptible epidemic model. In: Proceedings of the 18th International Conference on Database Systems for Advanced Applications (DASFAA), pp 454\u2013457. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-37450-0_35"},{"issue":"2","key":"121_CR36","first-page":"61","volume":"53","author":"A Malhotra","year":"2012","unstructured":"Malhotra, A., Malhotra, C.K., See, A.: How to get your messages retweeted. MIT Sloan Manag. Rev. 53(2), 61\u201366 (2012)","journal-title":"MIT Sloan Manag. Rev."},{"issue":"1","key":"121_CR37","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.nonrwa.2008.10.014","volume":"11","author":"CC McCluskey","year":"2010","unstructured":"McCluskey, C.C.: Complete global stability for an sir epidemic model with delaydistributed or discrete. Nonlinear Anal. Real World Appl. 11(1), 55\u201359 (2010)","journal-title":"Nonlinear Anal. Real World Appl."},{"issue":"1","key":"121_CR38","doi-asserted-by":"publisher","first-page":"016,128","DOI":"10.1103\/PhysRevE.66.016128","volume":"66","author":"ME Newman","year":"2002","unstructured":"Newman, M.E.: Spread of epidemic disease on networks. Phys. Rev. E 66(1), 016,128 (2002)","journal-title":"Phys. Rev. E"},{"key":"121_CR39","doi-asserted-by":"crossref","unstructured":"Petrovic, S., Osborne, M., Lavrenko, V.: Rt to win! predicting message propagation in twitter. In: Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM), pp. 586\u2013589 (2011)","DOI":"10.1609\/icwsm.v5i1.14149"},{"key":"121_CR40","doi-asserted-by":"crossref","unstructured":"Pramanik, S., Wang, Q., Danisch, M., Bandi, S., Kumar, A., Guillaume, J.L., Mitra, B.: On the role of mentions on tweet virality. In: Proceedings of the 4th IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 204\u2013213 (2016)","DOI":"10.1109\/DSAA.2016.28"},{"key":"121_CR41","doi-asserted-by":"crossref","unstructured":"Saito, K., Nakano, R., Kimura, M.: Prediction of information diffusion probabilities for independent cascade model. In: Proceedings of the 12th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES), Part III, pp. 67\u201375 (2008)","DOI":"10.1007\/978-3-540-85567-5_9"},{"key":"121_CR42","doi-asserted-by":"crossref","unstructured":"Suh, B., Hong, L., Pirolli, P., Chi, E.H.: Want to be retweeted? large scale analytics on factors impacting retweet in twitter network. In: 2010 IEEE Second International Conference on Social computing (SocialCom), pp. 177\u2013184 (2010)","DOI":"10.1109\/SocialCom.2010.33"},{"key":"121_CR43","first-page":"1","volume":"18","author":"L Tang","year":"2014","unstructured":"Tang, L., Ni, Z., Xiong, H., Zhu, H.: Locating targets through mention in twitter. World Wide Web 18, 1\u201331 (2014)","journal-title":"World Wide Web"},{"key":"121_CR44","doi-asserted-by":"crossref","unstructured":"Uysal, I., Croft, W.B.: User oriented tweet ranking: a filtering approach to microblogs. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management (CIKM), pp. 2261\u20132264 (2011)","DOI":"10.1145\/2063576.2063941"},{"key":"121_CR45","doi-asserted-by":"crossref","unstructured":"Wang, B., Wang, C., Bu, J., Chen, C., Zhang, W.V., Cai, D., He, X.: Whom to mention: expand the diffusion of tweets by @ recommendation on micro-blogging systems. In: Proceedings of the 22nd International Conference on World Wide Web (WWW), pp. 1331\u20131340 (2013)","DOI":"10.1145\/2488388.2488505"},{"key":"121_CR46","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1038\/srep00335","volume":"2","author":"L Weng","year":"2012","unstructured":"Weng, L., Flammini, A., Vespignani, A., Menczer, F.: Competition among memes in a world with limited attention. Sci. Rep. 2, 335 (2012)","journal-title":"Sci. Rep."},{"issue":"6","key":"121_CR47","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1109\/JSAC.2013.130606","volume":"31","author":"O Yagan","year":"2013","unstructured":"Yagan, O., Qian, D., Zhang, J., Cochran, D.: Conjoining speeds up information diffusion in overlaying social\u2013physical networks. IEEE J. Select. Areas Commun. 31(6), 1038\u20131048 (2013)","journal-title":"IEEE J. Select. Areas Commun."},{"key":"121_CR48","unstructured":"Zaman, T.R., Herbrich, R., Van Gael, J., Stern, D.: Predicting information spreading in twitter. In: Workshop on Computational Social Science and the Wisdom of Crowds. Neural Information Processing Systems (NIPS) vol. 104, pp. 17 (2010)"},{"key":"121_CR49","doi-asserted-by":"crossref","unstructured":"Zhao, Q., Erdogdu, M.A., He, H.Y., Rajaraman, A., Leskovec, J: Seismic: A self-exciting point process model for predicting tweet popularity. In: Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1513\u20131522 (2015)","DOI":"10.1145\/2783258.2783401"},{"key":"121_CR50","doi-asserted-by":"crossref","unstructured":"Zhou, G., Yu, L., Zhang, C.X., Liu, C., Zhang, Z.K., Zhang, J.: A novel approach for generating personalized mention list on micro-blogging system. In: 2015 IEEE International Conference on Data Mining Workshop (ICDMW), pp. 1368\u20131374 (2015)","DOI":"10.1109\/ICDMW.2015.51"}],"container-title":["International Journal of Data Science and Analytics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-018-0121-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41060-018-0121-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-018-0121-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T09:20:13Z","timestamp":1693646413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41060-018-0121-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,27]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["121"],"URL":"https:\/\/doi.org\/10.1007\/s41060-018-0121-2","relation":{},"ISSN":["2364-415X","2364-4168"],"issn-type":[{"type":"print","value":"2364-415X"},{"type":"electronic","value":"2364-4168"}],"subject":[],"published":{"date-parts":[[2018,4,27]]},"assertion":[{"value":"24 August 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}