{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:21:56Z","timestamp":1729650116810,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/asonam.2014.6921623","type":"proceedings-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T16:12:38Z","timestamp":1413994358000},"page":"443-450","source":"Crossref","is-referenced-by-count":7,"title":["Multi-objective optimization to identify key players in social networks"],"prefix":"10.1109","author":[{"given":"R. Chulaka","family":"Gunasekara","sequence":"first","affiliation":[]},{"given":"Kishan","family":"Mehrotra","sequence":"additional","affiliation":[]},{"given":"Chilukuri K.","family":"Mohan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"17","doi-asserted-by":"crossref","first-page":"477s","DOI":"10.1098\/rsbl.2004.0225","article-title":"Identifying the role that animals play in their social networks","volume":"271","author":"lusseau","year":"2004","journal-title":"Proceedings of the Royal Society of London Series B Biological Sciences"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-013-0263-7"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1086\/225469"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.mathsocsci.2013.05.005"},{"journal-title":"Evaluation of Node Importance in Complex Networks","year":"2014","author":"huang","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1038\/nphys1746"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963147"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963499"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.2307\/2785690"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(02)00016-3"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2005.11.005"},{"key":"10","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/978-3-540-89900-6_5","article-title":"An information theory approach to identify sets of key players","author":"ortiz-arroyo","year":"2008","journal-title":"Intelligence and Security Informatics"},{"journal-title":"The PageRank Citation Ranking Bringing Order to the Web","year":"1999","author":"page","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.1972.9989806"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69311-6_21"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2004-00111-4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-006-7084-x"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1086\/228631"}],"event":{"name":"2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","start":{"date-parts":[[2014,8,17]]},"location":"China","end":{"date-parts":[[2014,8,20]]}},"container-title":["2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6911097\/6921526\/06921623.pdf?arnumber=6921623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T10:12:09Z","timestamp":1565950329000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6921623\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/asonam.2014.6921623","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}