{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T21:57:41Z","timestamp":1775080661897,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/passat\/socialcom.2011.139","type":"proceedings-article","created":{"date-parts":[[2012,1,6]],"date-time":"2012-01-06T19:31:28Z","timestamp":1325878288000},"page":"354-361","source":"Crossref","is-referenced-by-count":38,"title":["Group-in-a-Box Layout for Multi-faceted Analysis of Communities"],"prefix":"10.1109","author":[{"given":"Eduarda Mendes","family":"Rodrigues","sequence":"first","affiliation":[]},{"given":"Natasa","family":"Milic-Frayling","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Ben","family":"Shneiderman","sequence":"additional","affiliation":[]},{"given":"Derek","family":"Hansen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/102377.115768"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1462173.1462175"},{"key":"17","article-title":"Simple representations of complex networks: Strategies for visualizing network structure","author":"krempel","year":"1993","journal-title":"The 3rd European Conference for Network Analysis"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242805"},{"key":"18","first-page":"1333","article-title":"An energy model for visual graph clustering","volume":"14","author":"noack","year":"2008","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/VISUAL.1991.175815"},{"key":"16","first-page":"349","article-title":"Constraint-Based Spring-Model Algorithm for Graph Layout","author":"kamps","year":"1995","journal-title":"Lecture Notes in Computer Science"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2008.141"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2007.70582"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.7155\/jgaa.00051"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.3115\/1599600.1599650"},{"key":"21","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1145\/1556460.1556497","article-title":"Analyzing (social media) networks with NodeXL","author":"smith","year":"2009","journal-title":"Proc of the 4th International Conference on Communities and Technologies (C&T'09)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066111"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2006.166"},{"key":"2","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"baraba?si","year":"1999","journal-title":"Science"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.4.357"},{"key":"10","author":"hansen","year":"2010","journal-title":"Analyzing Social Media Networks with NodeXL Insights from a Connected World"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.122653799"},{"key":"6","first-page":"290","volume":"6","author":"erdo?s","year":"1959","journal-title":"On Random Graphs"},{"key":"5","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/3-540-62495-3_41","article-title":"Multilevel Visualization of Clustered Graphs","author":"eades","year":"1997","journal-title":"Lecture Notes in Computer Science"},{"key":"4","first-page":"149","article-title":"A heuristic for graph drawing","volume":"42","author":"eades","year":"1984","journal-title":"Congressus Numerantium"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380211102"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.2307\/3033543"}],"event":{"name":"2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) \/ 2011 IEEE Third Int'l Conference on Social Computing (SocialCom)","location":"Boston, MA, USA","start":{"date-parts":[[2011,10,9]]},"end":{"date-parts":[[2011,10,11]]}},"container-title":["2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112285\/6113084\/06113135.pdf?arnumber=6113135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T12:22:55Z","timestamp":1497961375000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6113135\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/passat\/socialcom.2011.139","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}