{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:07:51Z","timestamp":1729649271629,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1109\/coase.2008.4626551","type":"proceedings-article","created":{"date-parts":[[2008,9,24]],"date-time":"2008-09-24T17:55:06Z","timestamp":1222278906000},"page":"989-994","source":"Crossref","is-referenced-by-count":3,"title":["Cohesive subgroup model for graph-based text mining"],"prefix":"10.1109","author":[{"given":"Balabhaskar","family":"Balasundaram","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s10878-005-1857-x"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289199"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/BF00139635"},{"key":"33","article-title":"a density based approaches to network analysis: analysis of reuters terror news network","author":"batagelj","year":"2003","journal-title":"Proc Ninth ACM SIGKDD"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1287\/opre.42.2.299"},{"key":"34","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"emergence of scaling in random networks","volume":"286","author":"baraba?si","year":"1999","journal-title":"Science"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45995-2_51"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.1978.9989883"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/0166-218X(84)90088-X"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.1973.9989826"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1086\/229972"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(01)00133-3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(99)00047-7"},{"article-title":"graph theoretic generalizations of clique: optimization and extensions","year":"2007","author":"balasundaram","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1100.0851"},{"journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness","year":"1979","author":"garey","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/BF02392825"},{"year":"0","key":"26"},{"journal-title":"Integer and Combinatorial Optimization","year":"1999","author":"nemhauser","key":"27"},{"key":"28","first-page":"65","article-title":"branch-and-cut algorithms for combinatorial optimization problems","author":"mitchell","year":"2002","journal-title":"Handbook of Applied Optimization"},{"year":"0","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.061034498"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/959242.959249"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289146"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/5254.850825"},{"journal-title":"Pajek datasets Reuters terror news network","year":"2006","author":"batagelj","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2005.01.027"},{"key":"6","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1090\/dimacs\/050\/06","article-title":"on maximum clique problems in very large graphs","volume":"50","author":"abello","year":"1999","journal-title":"ser DIMACS Series on Discrete Mathematics and Theoretical Computer Science"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1093\/hcr\/28.2.157"},{"key":"5","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1117\/12.434393","article-title":"internet topology: connectivity of ip graphs","author":"broido","year":"2001","journal-title":"Scalability and Traffic Control in IP Networks"},{"journal-title":"LOCKS Analysis of media coverage of the terrorist attacks","year":"2006","author":"corman","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34569-7_7"},{"journal-title":"Social Network Analysis A Handbook","year":"2000","author":"scott","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"}],"event":{"name":"2008 IEEE International Conference on Automation Science and Engineering (CASE 2008)","start":{"date-parts":[[2008,8,23]]},"location":"Arlington, VA","end":{"date-parts":[[2008,8,26]]}},"container-title":["2008 IEEE International Conference on Automation Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4622934\/4626395\/04626551.pdf?arnumber=4626551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T05:31:51Z","timestamp":1557811911000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4626551\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/coase.2008.4626551","relation":{},"subject":[],"published":{"date-parts":[[2008,8]]}}}