{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T06:18:14Z","timestamp":1776493094209,"version":"3.51.2"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icdm.2016.0033","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T20:39:50Z","timestamp":1486499990000},"page":"221-230","source":"Crossref","is-referenced-by-count":347,"title":["Edge Weight Prediction in Weighted Signed Networks"],"prefix":"10.1109","author":[{"given":"Srijan","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Francesca","family":"Spezzano","sequence":"additional","affiliation":[]},{"given":"V. S.","family":"Subrahmanian","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Faloutsos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v8i1.14550","article-title":"Vader: A parsimonious rule-based model for sentiment analysis of social media text","author":"hutto","year":"2014","journal-title":"ICWSM"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-39884-1_3","article-title":"Beware the middleman: Empirical analysis of bitcoin-exchange risk","author":"moore","year":"2013","journal-title":"Financial Cryptography (FC)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"ref30","year":"0","journal-title":"Project webpage"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2015.16"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2014.6921650"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1996413.1996417"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2628438"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2004.08.007"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772756"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1037\/h0046049"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963485"},{"key":"ref16","article-title":"Social network-based trust in prioritized default logic","author":"katz","year":"2006","journal-title":"AAAI"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2898361"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37210-0_29"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623664"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889391"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772790"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2835776.2835816"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.80.036115"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752289"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753532"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0102199"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00354-014-0404-7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2014.6921581"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1162\/tacl_a_00184","article-title":"Exploiting social network structure for person-to-person sentiment analysis","volume":"2","author":"west","year":"2014","journal-title":"TACL"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-014-0172-x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.56"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348359"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145360"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2956185"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v3i1.13957","article-title":"Using transactional information to predict link strength in online social networks","author":"kahanda","year":"2009","journal-title":"ICWSM"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518736"}],"event":{"name":"2016 IEEE 16th International Conference on Data Mining (ICDM)","location":"Barcelona, Spain","start":{"date-parts":[[2016,12,12]]},"end":{"date-parts":[[2016,12,15]]}},"container-title":["2016 IEEE 16th International Conference on Data Mining (ICDM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7837023\/7837813\/07837846.pdf?arnumber=7837846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T02:58:25Z","timestamp":1749956305000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7837846\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/icdm.2016.0033","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}