{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:16Z","timestamp":1750307536667,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,28]],"date-time":"2008-03-28T00:00:00Z","timestamp":1206662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3,28]]},"DOI":"10.1145\/1593105.1593230","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T13:29:27Z","timestamp":1249997367000},"page":"475-480","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Using an edge-dual graph and\n            <i>k<\/i>\n            -connectivity to identify strong connections in social networks"],"prefix":"10.1145","author":[{"given":"Li","family":"Ding","sequence":"first","affiliation":[{"name":"The University of Alabama, Tuscaloosa, AL"}]},{"given":"Brandon","family":"Dixon","sequence":"additional","affiliation":[{"name":"The University of Alabama, Tuscaloosa, AL"}]}],"member":"320","published-online":{"date-parts":[[2008,3,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Wasserman S and Faust K. 1994. Social network analysis: methods and applications. Cambridge University Press. 4--10  Wasserman S and Faust K. 1994. Social network analysis: methods and applications. Cambridge University Press. 4--10","DOI":"10.1017\/CBO9780511815478"},{"key":"e_1_3_2_1_2_1","volume-title":"The virtual community: homesteading on the electronic frontier","author":"Rheingold H.","year":"1993","unstructured":"Rheingold , H. 1993. The virtual community: homesteading on the electronic frontier . Addison-Wesley Pub . 1993 . Rheingold, H. 1993. The virtual community: homesteading on the electronic frontier. Addison-Wesley Pub. 1993."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2007.07.021"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1116869"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1297301"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis","author":"Goldberg H. G","year":"1998","unstructured":"Goldberg , H. G and Wong , R. W. H. 1998. Restructuring databases for knowledge discovery by consolidation and link information . In Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis ( Menlo Park, CA , 1998 ). Goldberg, H. G and Wong, R. W. H. 1998. Restructuring databases for knowledge discovery by consolidation and link information. In Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis (Menlo Park, CA, 1998)."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis","author":"Goldberg H. G","year":"1998","unstructured":"Goldberg , H. G and Wong , R. W. H. 1998. Restructuring transactional data for link analysis in the FinCen AI system . In Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis ( Menlo Park, CA , 1998 ). Goldberg, H. G and Wong, R. W. H. 1998. Restructuring transactional data for link analysis in the FinCen AI system. In Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis (Menlo Park, CA, 1998)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.989927"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(03)00117-9"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4371(02)00736-7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Harary F. 1969. Graph Theory. 45--46  Harary F. 1969. Graph Theory. 45--46","DOI":"10.21236\/AD0705364"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2307\/3088904"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1142\/1280"},{"key":"e_1_3_2_1_15_1","unstructured":"Cormen T. H. Leiserson C. E. Rivest R. L. and Stein C. 2001. Introduction to algorithms (second edition). MIT Press. 643--662.   Cormen T. H. Leiserson C. E. Rivest R. L. and Stein C. 2001. Introduction to algorithms (second edition). MIT Press. 643--662."},{"key":"e_1_3_2_1_16_1","unstructured":"Web site: http:\/\/www.jgraph.com\/  Web site: http:\/\/www.jgraph.com\/"}],"event":{"name":"ACM SE08: ACM Southeast Regional Conference","acronym":"ACM SE08","location":"Auburn Alabama"},"container-title":["Proceedings of the 46th Annual Southeast Regional Conference on XX"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1593105.1593230","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1593105.1593230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:19Z","timestamp":1750249399000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1593105.1593230"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,28]]},"references-count":16,"alternative-id":["10.1145\/1593105.1593230","10.1145\/1593105"],"URL":"https:\/\/doi.org\/10.1145\/1593105.1593230","relation":{},"subject":[],"published":{"date-parts":[[2008,3,28]]},"assertion":[{"value":"2008-03-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}