{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T17:20:11Z","timestamp":1746033611299},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/chinacom.2012.6417477","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T22:52:09Z","timestamp":1359586329000},"page":"206-211","source":"Crossref","is-referenced-by-count":1,"title":["Hierarchical activeness state evaluation model for BBS network community"],"prefix":"10.1109","author":[{"family":"Xiuzhen Chen","sequence":"first","affiliation":[]},{"family":"Jianhua Li","sequence":"additional","affiliation":[]},{"family":"Shenghong Li","sequence":"additional","affiliation":[]},{"family":"Yanan Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"year":"0","key":"17"},{"year":"0","key":"18"},{"year":"0","key":"15"},{"journal-title":"Li Gang Incident","year":"0","key":"16"},{"journal-title":"Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System (NIDES) Computer Science Laboratory","year":"1995","author":"debra","key":"13"},{"journal-title":"Tianya Club","year":"0","key":"14"},{"key":"11","article-title":"The genetic algorithm as a general diffusion model for social networks","author":"mayank","year":"2010","journal-title":"Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence (AAAI10)"},{"journal-title":"Next-generation Intrusion Detection Expert System (NIDES)-a Summary","year":"1995","author":"debra","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298311"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994248"},{"journal-title":"Chinas Censors Misfire in Abuse-of-power Case","year":"2010","author":"michael","key":"1"},{"key":"10","article-title":"Characterizing social cascades in Flickr","author":"meeyoung","year":"2008","journal-title":"Proceedings of the 1st Workshop on Online Social Networks (WOSP08)"},{"key":"7","article-title":"User interactions in social networks and their implications","author":"christo","year":"2009","journal-title":"Proceedings of the 4th ACM European Conference on Computer Systems (EuroSys09)"},{"key":"6","article-title":"Analyzing reading behavior by blog mining","author":"tadanobu","year":"2007","journal-title":"Proceedings of the 22nd National Conference on Artificial Intelligence (AAAI07)"},{"key":"5","article-title":"Read and reply behaviors in a BBS social network","author":"fei","year":"2010","journal-title":"Proceedings of the 2nd International Conference on Advanced Computer Control (ICACC 2010)"},{"journal-title":"The Structure of Self-organized Blogosphere","year":"0","author":"fueng","key":"4"},{"key":"9","article-title":"Information diffusion through blogspace","author":"daniel","year":"2004","journal-title":"Proceedings of the 12th international conference on World Wide Web"},{"key":"8","article-title":"On the evolution of user interaction in Facebook","author":"bimal","year":"2009","journal-title":"Proceedings of the 2nd ACM Workshop on Online Social Networks (WOSN 09) An ACM SIGCOMM 2009 Workshop"}],"event":{"name":"2012 7th International ICST Conference on Communications and Networking in China (CHINACOM 2012)","start":{"date-parts":[[2012,8,8]]},"location":"Kun Ming","end":{"date-parts":[[2012,8,10]]}},"container-title":["7th International Conference on Communications and Networking in China"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6410218\/6417432\/06417477.pdf?arnumber=6417477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:47:43Z","timestamp":1490143663000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6417477\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/chinacom.2012.6417477","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}