{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:47:43Z","timestamp":1730292463544,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/rcis.2018.8406647","type":"proceedings-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T18:52:35Z","timestamp":1531162355000},"page":"1-11","source":"Crossref","is-referenced-by-count":1,"title":["Influence in time-dependent citation networks"],"prefix":"10.1109","author":[{"given":"Monika Ewa","family":"Rakoczy","sequence":"first","affiliation":[]},{"given":"Amel","family":"Bouzeghoub","sequence":"additional","affiliation":[]},{"given":"Alda Lopes","family":"Gancarski","sequence":"additional","affiliation":[]},{"given":"Katarzyna","family":"Wegrzyn-Wolska","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2016","author":"yang","journal-title":"Influence activation model A new perspective in social influence analysis and social network evolution","key":"ref33"},{"key":"ref32","first-page":"539","article-title":"Predicating paper influence in academic network","author":"yi","year":"2016","journal-title":"Computer Supported Cooperative Work in Design (CSCWD) 2016 IEEE 20th International Conference on"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10115-007-0114-2","article-title":"Top 10 algorithms in data mining","volume":"14","author":"xindong","year":"2008","journal-title":"Knowledge and Information Systems"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/ICDM.2011.67"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jiit.2013010101","article-title":"Identifying influencers in online social networks: The role of tie strength","volume":"9","author":"yifeng","year":"2013","journal-title":"International Journal of Intelligent Information Technologies (IJIIT)"},{"year":"2014","author":"reza","journal-title":"Social Media Mining An Introduction","key":"ref34"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1080\/17517575.2013.804586","article-title":"Identifying influential user communities on the social network","volume":"9","author":"weishu","year":"2015","journal-title":"Enterprise Information Systems"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ASONAM.2009.17"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"105","DOI":"10.4086\/toc.2015.v011a004","article-title":"Maximizing the spread of influence through a social network","volume":"11","author":"david","year":"2015","journal-title":"Theory of Computing"},{"key":"ref13","first-page":"9","article-title":"Modeling direct and indirect influence across heterogeneous social networks","author":"minkyoung","year":"0","journal-title":"Proc of the Workshop on Social Network Mining and Analysis"},{"year":"2010","author":"maksim","journal-title":"Identification of Influential Spreaders in Complex Networks","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1311","DOI":"10.1007\/s13278-013-0143-7","article-title":"Discovering and validating influence in a dynamic online social network","volume":"3","author":"peter","year":"2013","journal-title":"Social Network Analysis and Mining"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.neucom.2015.11.129","article-title":"Tosi: a trust-oriented social influence evaluation method in contextual social networks","volume":"210","author":"guanfeng","year":"2016","journal-title":"Neurocomputing"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/1871437.1871467"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s10618-012-0252-3"},{"key":"ref19","first-page":"48","article-title":"Csi: Community-level social influence analysis","author":"yasir","year":"0","journal-title":"Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases"},{"key":"ref28","first-page":"6","author":"arnab","year":"0","journal-title":"Microsoft academic graph &#x2013; 2016\/02\/05"},{"key":"ref4","first-page":"51","article-title":"A new granger causal model for influence evolution in dynamic social networks: The case of dblp","author":"chikhaoui","year":"0","journal-title":"Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence AAAI' 15"},{"key":"ref27","first-page":"243","article-title":"An overview of microsoft academic service (mas) and applications","author":"arnab","year":"0","journal-title":"Proceedings of the 24th International Conference on World Wide Web WWW &#x2018;15 Companion"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/DSAA.2015.7344846"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/1273496.1273526"},{"key":"ref29","first-page":"397","article-title":"Analyzing topic evolution in bioinformatics: investigation of dynamics of the field with conference data in dblp","volume":"101","author":"min","year":"0","journal-title":"Scientometrics"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/3070658"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.2307\/1912791"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/0304-4076(83)90012-X"},{"year":"0","journal-title":"AMiner Aminer computer science conference rank - artificial intelligence and pattern recognition","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1073\/pnas.0507655102"},{"key":"ref1","first-page":"636","article-title":"On influential node discovery in dynamic social networks","author":"charu","year":"0","journal-title":"Proceedings of the 2012 SIAM International Conference on Data Mining"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1111\/exsy.12062"},{"key":"ref22","first-page":"1","article-title":"Finding contexts of social influence in online social networks","author":"jennifer","year":"0","journal-title":"Proc of the Workshop on Social Network Mining and Analysis"},{"key":"ref21","first-page":"33","article-title":"Information diffusion and external influence in networks","author":"seth","year":"0","journal-title":"Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining"},{"year":"1999","author":"lawrence","journal-title":"The PageRank Citation Ranking Bringing Order to the Web Technical Report Stanford InfoLab","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.14778\/2994509.2994525"},{"key":"ref26","first-page":"2282","article-title":"Klout score: Measuring influence across multiple social networks","author":"adithya","year":"0","journal-title":"Big Data (Big Data) 2015 IEEE International Conference on"},{"key":"ref25","first-page":"155","author":"monika","year":"2016","journal-title":"Users Views on Others - Analysis of Confused Relation-Based Terms in Social Network"}],"event":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","start":{"date-parts":[[2018,5,29]]},"location":"Nantes","end":{"date-parts":[[2018,5,31]]}},"container-title":["2018 12th International Conference on Research Challenges in Information Science (RCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8401323\/8406639\/08406647.pdf?arnumber=8406647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T03:46:27Z","timestamp":1533008787000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8406647\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/rcis.2018.8406647","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}