{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T18:56:42Z","timestamp":1778871402877,"version":"3.51.4"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/snams.2018.8554850","type":"proceedings-article","created":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T20:03:09Z","timestamp":1543867389000},"page":"59-63","source":"Crossref","is-referenced-by-count":3,"title":["Computing Ranking and Dynamics in Social Networks"],"prefix":"10.1109","author":[{"given":"Zineb","family":"Felfli","sequence":"first","affiliation":[]},{"given":"Rov","family":"Georze","sequence":"additional","affiliation":[]},{"given":"Khalil","family":"Shuiace","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Kerwat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752253"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11222-007-9046-7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1214\/16-AOS1457"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1312486110"},{"key":"ref14","first-page":"406","article-title":"Spectral clustering of graphs with the Bethe Hessian","author":"saade","year":"2014","journal-title":"Adv Neural Info Proc Sys"},{"key":"ref15","article-title":"No Free Lunch Theorems for Search","author":"wolpert","year":"1995","journal-title":"Technical Report SFI-TR-95-02-010 (Santa Fe Institute)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/4235.585893"},{"key":"ref17","author":"ghasemian","year":"2018","journal-title":"Evaluating Overfit and Underfit in Models of Network Community Structure"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2013.09.016"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401984"},{"key":"ref4","author":"scott","year":"2000","journal-title":"Social Network Analysis A Handbook"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1137\/0611030"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.122653799"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2004-00124-y"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.026113"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s41109-017-0023-6"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"298","DOI":"10.21136\/CMJ.1973.101168","article-title":"Algebraic connectivity of graphs","volume":"23","author":"fiedler","year":"1973","journal-title":"Czech Math J"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.100.258701"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1970.tb01770.x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2009.11-07-643"},{"key":"ref22","first-page":"58","article-title":"An efficient approach to clustering in large multimedia databases with noise","volume":"98","author":"hinneburg","year":"1998","journal-title":"KDD"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/0191-2615(96)00003-3"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"barabasi","year":"1999","journal-title":"Science"},{"key":"ref23","author":"barabasi","year":"2017","journal-title":"Network Science"},{"key":"ref25","article-title":"Discovering Community Structure in Dynamic Social Networks using the Correlation Density Rank","author":"bahrami bidoni","year":"2014","journal-title":"ASE BIGDATA\/SOCIALCOM\/CYBERSECURITY Conference"}],"event":{"name":"2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)","location":"Valencia","start":{"date-parts":[[2018,10,15]]},"end":{"date-parts":[[2018,10,18]]}},"container-title":["2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536820\/8554420\/08554850.pdf?arnumber=8554850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T12:35:29Z","timestamp":1605530129000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554850\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/snams.2018.8554850","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}