{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:58:01Z","timestamp":1729648681971,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578858","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:11:25Z","timestamp":1377724285000},"page":"358-363","source":"Crossref","is-referenced-by-count":7,"title":["PHYSENSE: Scalable sociological interaction models for influence estimation on online social networks"],"prefix":"10.1109","author":[{"given":"Arun V.","family":"Sathanur","sequence":"first","affiliation":[]},{"given":"Vikram","family":"Jandhyala","sequence":"additional","affiliation":[]},{"given":"Chuanjia","family":"Xing","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Modeling users' activity on twitter networks: Validation of dunbar's number","volume":"6","author":"gonc?alves","year":"2011","journal-title":"PLoS ONE"},{"key":"17","first-page":"1","article-title":"Social influence networks and opinion change","volume":"16","author":"friedkin","year":"1999","journal-title":"Advances in Group Processes"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511976735"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1137\/1031049"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1145\/1718487.1718520","article-title":"TwitterRank: Finding topicsensitive influential twitterers","author":"weng","year":"2010","journal-title":"Proc 3rd ACM International Conference on Web Search and Data Mining"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.70"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513054"},{"key":"13","first-page":"63","article-title":"On the interaction of influence and trust in social networks","author":"hajian","year":"2012","journal-title":"ACM EC 2012 Workshop on Incentives and Trust in E-Commerce"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935845"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.14778\/2047485.2047492"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.118"},{"journal-title":"The Anatomy of the Facebook Social Graph","year":"0","author":"ugander","key":"21"},{"year":"0","key":"20"},{"journal-title":"Fields and Waves in Inhomogeneous Media","year":"1990","author":"chew","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/2024724.2024789"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970937"},{"journal-title":"Finite Markov Chains","year":"1976","author":"kemeny","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1086\/229694"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2004.11.008"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1515\/9781400830329"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.2307\/2332226"},{"journal-title":"The Influentials New Approaches for Analyzing Influence on Twitter","year":"2011","author":"leavitt","key":"3"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v4i1.14033","article-title":"Measuring user influence on twitter: The million follower fallacy","author":"cha","year":"2010","journal-title":"4th Int'l AAAI Conference on Weblogs and Social Media"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.122653799"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.14778\/1929861.1929864"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935882"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"journal-title":"A Twitter Analog to PageRank","year":"2009","author":"tunkelang","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/APS.2012.6347958"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1515\/9781400837069","author":"kamvar","year":"2010","journal-title":"Numerical Algorithms for Personalized Search in Large-Scale Self-Organizing Information Networks"},{"key":"8","article-title":"TURank: Twitter user ranking based on user-tweet graph analysis","author":"yamaguchi","year":"2010","journal-title":"Proc Web Information Systems Engineering"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578858.pdf?arnumber=6578858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T05:01:17Z","timestamp":1688446877000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578858\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578858","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}