{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T10:25:33Z","timestamp":1776335133315,"version":"3.51.2"},"reference-count":31,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2013,4,30]],"date-time":"2013-04-30T00:00:00Z","timestamp":1367280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGKDD Explor. Newsl."],"published-print":{"date-parts":[[2013,4,30]]},"abstract":"<jats:p>Most objects and data in the real world are of multiple types, interconnected, forming complex, heterogeneous but often semi-structured information networks. However, most network science researchers are focused on homogeneous networks, without distinguishing different types of objects and links in the networks. We view interconnected, multityped data, including the typical relational database data, as heterogeneous information networks, study how to leverage the rich semantic meaning of structural types of objects and links in the networks, and develop a structural analysis approach on mining semi-structured, multi-typed heterogeneous information networks. In this article, we summarize a set of methodologies that can effectively and efficiently mine useful knowledge from such information networks, and point out some promising research directions.<\/jats:p>","DOI":"10.1145\/2481244.2481248","type":"journal-article","created":{"date-parts":[[2013,5,3]],"date-time":"2013-05-03T12:30:25Z","timestamp":1367584225000},"page":"20-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":500,"title":["Mining heterogeneous information networks"],"prefix":"10.1145","volume":"14","author":[{"given":"Yizhou","family":"Sun","sequence":"first","affiliation":[{"name":"Northeastern University, Boston, MA"}]},{"given":"Jiawei","family":"Han","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]}],"member":"320","published-online":{"date-parts":[[2013,4,30]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1971972"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/297805.297827"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.30"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMsa066082"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2232817.2232833"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020600"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1921008"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/3120676.3120679"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020603"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888258.1888302"},{"key":"e_1_2_1_11_1","volume-title":"Diffusion of Innovations","author":"Rogers E. M.","year":"2003","unstructured":"E. M. Rogers . Diffusion of Innovations , 5 th Edition. Free Press , 2003 . E. M. Rogers. Diffusion of Innovations, 5th Edition. Free Press, 2003.","edition":"5"},{"key":"e_1_2_1_12_1","volume-title":"Proc. 2007 AAAI Conf. on Artificial Intelligence (AAAI'07)","author":"Roy T. L. S.","year":"2007","unstructured":"T. L. S. Roy and M. Werner-Washburne . Integrative construction and analysis of condition-specific biological networks . In Proc. 2007 AAAI Conf. on Artificial Intelligence (AAAI'07) , Vancouver, BC , July 2007 . T. L. S. Roy and M. Werner-Washburne. Integrative construction and analysis of condition-specific biological networks. In Proc. 2007 AAAI Conf. on Artificial Intelligence (AAAI'07), Vancouver, BC, July 2007."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2247596.2247618"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14778\/2140436.2140437"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2011.112"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124373"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.43"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14778\/3402707.3402736"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516426"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339738"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1830252.1830270"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557107"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376675"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.82"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835833"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.45"},{"key":"e_1_2_1_27_1","volume-title":"Proc. 2007 Int. Conf. Data Engineering (ICDE'07)","author":"Yin X.","year":"2007","unstructured":"X. Yin , J. Han , and P. S. Yu . Object distinction: Distinguishing objects with identical names by link analysis . In Proc. 2007 Int. Conf. Data Engineering (ICDE'07) , Istanbul, Turkey , April 2007 . X. Yin, J. Han, and P. S. Yu. Object distinction: Distinguishing objects with identical names by link analysis. In Proc. 2007 Int. Conf. Data Engineering (ICDE'07), Istanbul, Turkey, April 2007."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190745"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339765"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14778\/2168651.2168656"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989413"}],"container-title":["ACM SIGKDD Explorations Newsletter"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2481244.2481248","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2481244.2481248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:14Z","timestamp":1750235954000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2481244.2481248"}},"subtitle":["a structural analysis approach"],"short-title":[],"issued":{"date-parts":[[2013,4,30]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4,30]]}},"alternative-id":["10.1145\/2481244.2481248"],"URL":"https:\/\/doi.org\/10.1145\/2481244.2481248","relation":{},"ISSN":["1931-0145","1931-0153"],"issn-type":[{"value":"1931-0145","type":"print"},{"value":"1931-0153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,30]]},"assertion":[{"value":"2013-04-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}