{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:11:37Z","timestamp":1729678297708,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/icnp.2016.7785319","type":"proceedings-article","created":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T16:55:41Z","timestamp":1482166541000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Exploring mobile users and their effects in online social networks: A Twitter case study"],"prefix":"10.1109","author":[{"family":"Konglin Zhu","sequence":"first","affiliation":[]},{"family":"Wenting Zhi","sequence":"additional","affiliation":[]},{"family":"Lin Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2632951.2632973"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","article-title":"Collective dynamics of &#x2018;small-world&#x2019; networks","volume":"393","author":"watts","year":"1998","journal-title":"Nature"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519089"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685287"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989659"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0100023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2015.7404750"},{"key":"ref3","first-page":"22","article-title":"Re: Reliable email","volume":"6","author":"garriss","year":"2006","journal-title":"NSDI"},{"key":"ref6","first-page":"1","article-title":"Se-curerun: Cheat-proof and private summaries for location-based activities","author":"pham","year":"2016","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370422"},{"key":"ref8","first-page":"306","article-title":"Mining user behaviours: A study of check-in patterns in location based social networks","author":"preo","year":"2013","journal-title":"Proceedings of the 5th Annual ACM Web Science Conference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592678"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020579"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1108\/10662241111104866"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594374"}],"event":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2016,11,8]]},"location":"Singapore","end":{"date-parts":[[2016,11,11]]}},"container-title":["2016 IEEE 24th International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7774710\/7784399\/07785319.pdf?arnumber=7785319","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T02:17:56Z","timestamp":1498357076000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7785319\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icnp.2016.7785319","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}