{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T10:18:03Z","timestamp":1772187483136,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,2,2]],"date-time":"2018-02-02T00:00:00Z","timestamp":1517529600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-09-2-0053"],"award-info":[{"award-number":["W911NF-09-2-0053"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["U01HG008488, R01GM115833, U54GM114833"],"award-info":[{"award-number":["U01HG008488, R01GM115833, U54GM114833"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1313606"],"award-info":[{"award-number":["IIS-1313606"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,2,2]]},"DOI":"10.1145\/3018661.3018669","type":"proceedings-article","created":{"date-parts":[[2017,2,2]],"date-time":"2017-02-02T15:09:48Z","timestamp":1486048188000},"page":"455-464","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["Temporally Factorized Network Modeling for Evolutionary Network Analysis"],"prefix":"10.1145","author":[{"given":"Wenchao","family":"Yu","sequence":"first","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"given":"Charu C.","family":"Aggarwal","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Yorktown, NY, USA"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,2,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601412"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/wics.1347"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921632.1921636"},{"key":"e_1_3_2_1_4_1","first-page":"1687","volume-title":"Nonparametric link prediction in dynamic networks","author":"Sarkar P.","year":"2012","unstructured":"P. Sarkar, D. Chakrabarti, and M. Jordan, \"Nonparametric link prediction in dynamic networks,\" pp. 1687--1694, 2012."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150412"},{"key":"e_1_3_2_1_6_1","first-page":"63","volume-title":"Evolutionary clustering and analysis of bibliographic networks,\" in ASONAM","author":"Gupta M.","year":"2011","unstructured":"M. Gupta, C. C. Aggarwal, J. Han, and Y. Sun, \"Evolutionary clustering and analysis of bibliographic networks,\" in ASONAM, pp. 63--70, IEEE, 2011."},{"key":"e_1_3_2_1_7_1","volume-title":"ACM","author":"Chi Y.","year":"2007","unstructured":"Y. Chi, X. Song, D. Zhou, K. Hino, and B. L. Tseng, \"Evolutionary spectral clustering by incorporating temporal smoothness,\" in KDD, pp. 153--162, ACM, 2007."},{"key":"e_1_3_2_1_8_1","first-page":"77","volume-title":"Event detection in time series of mobile communication graphs,\" in Army Science Conference","author":"Akoglu L.","year":"2010","unstructured":"L. Akoglu and C. Faloutsos, \"Event detection in time series of mobile communication graphs,\" in Army Science Conference, pp. 77--79, 2010."},{"key":"e_1_3_2_1_9_1","volume-title":"ACM","author":"Ide T.","year":"2004","unstructured":"T. Ide and H. Kashima, \"Eigenspace-based anomaly detection in computer systems,\" in KDD, pp. 440--449, ACM, 2004."},{"key":"e_1_3_2_1_10_1","first-page":"1271","volume-title":"On anomalous hotspot discovery in graph streams,\" in ICDM","author":"Yu W.","year":"2013","unstructured":"W. Yu, C. C. Aggarwal, S. Ma, and H. Wang, \"On anomalous hotspot discovery in graph streams,\" in ICDM, pp. 1271--1276, IEEE, 2013."},{"key":"e_1_3_2_1_11_1","first-page":"106","volume-title":"Symmetric nonnegative matrix factorization for graph clustering.,\" in SDM","author":"Kuang D.","year":"2012","unstructured":"D. Kuang, H. Park, and C. H. Ding, \"Symmetric nonnegative matrix factorization for graph clustering.,\" in SDM, vol. 12, pp. 106--117, SIAM, 2012."},{"key":"e_1_3_2_1_12_1","volume-title":"ACM","author":"Tang L.","year":"2008","unstructured":"L. Tang, H. Liu, J. Zhang, and Z. Nazeri, \"Community evolution in dynamic multi-mode networks,\" in KDD, pp. 677--685, ACM, 2008."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.88.042812"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281266"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2009.02.002"},{"key":"e_1_3_2_1_16_1","volume-title":"Trust-aware bootstrapping of recommender systems,\" in ECAI workshop on recommender systems","author":"Massa P.","year":"2006","unstructured":"P. Massa and P. Avesani, \"Trust-aware bootstrapping of recommender systems,\" in ECAI workshop on recommender systems, vol. 28, p. 29, 2006."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtbi.2010.11.033"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217301"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20591"},{"key":"e_1_3_2_1_20_1","first-page":"85","article-title":"Link prediction of social networks based on weighted proximity measures","author":"Murata T.","year":"2007","unstructured":"T. Murata and S. Moriyasu, \"Link prediction of social networks based on weighted proximity measures,\" in WI, pp. 85--88, IEEE, 2007.","journal-title":"WI"},{"key":"e_1_3_2_1_21_1","volume-title":"Prediction of links and weights in networks by reliable routes,\" Scientific reports","author":"Zhao J.","year":"2015","unstructured":"J. Zhao, L. Miao, J. Yang, H. Fang, Q.-M. Zhang, M. Nie, P. Holme, and T. Zhou, \"Prediction of links and weights in networks by reliable routes,\" Scientific reports, vol. 5, 2015."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(03)00009-1"},{"key":"e_1_3_2_1_23_1","volume-title":"ACM","author":"Lichtenwalter R. N.","year":"2010","unstructured":"R. N. Lichtenwalter, J. T. Lussier, and N. V. Chawla, \"New perspectives and methods in link prediction,\" in KDD, pp. 243--252, ACM, 2010."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129088"},{"key":"e_1_3_2_1_25_1","first-page":"1687","article-title":"Nonparametric link prediction in dynamic networks","author":"Sarkar P.","year":"2012","unstructured":"P. Sarkar, D. Chakrabarti, and M. I. Jordan, \"Nonparametric link prediction in dynamic networks,\" in ICML, pp. 1687--1694, 2012.","journal-title":"ICML"},{"key":"e_1_3_2_1_26_1","first-page":"437","volume-title":"Link prediction via matrix factorization,\" in PKDD","author":"Menon A. K.","year":"2011","unstructured":"A. K. Menon and C. Elkan, \"Link prediction via matrix factorization,\" in PKDD, pp. 437--452, Springer, 2011."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921632.1921636"},{"key":"e_1_3_2_1_28_1","volume-title":"ACM","author":"Fu W.","year":"2009","unstructured":"W. Fu, L. Song, and E. P. Xing, \"Dynamic mixed membership blockmodel for evolving networks,\" in ICML, pp. 329--336, ACM, 2009."},{"key":"e_1_3_2_1_29_1","volume-title":"ACM","author":"Rossi R. A.","year":"2013","unstructured":"R. A. Rossi, B. Gallagher, J. Neville, and K. Henderson, \"Modeling dynamic behavior in large evolving graphs,\" in WSDM, pp. 667--676, ACM, 2013."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150445"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721677"}],"event":{"name":"WSDM 2017: Tenth ACM International Conference on Web Search and Data Mining","location":"Cambridge United Kingdom","acronym":"WSDM 2017","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the Tenth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018661.3018669","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018661.3018669","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018661.3018669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:37:56Z","timestamp":1763458676000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018661.3018669"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,2]]},"references-count":31,"alternative-id":["10.1145\/3018661.3018669","10.1145\/3018661"],"URL":"https:\/\/doi.org\/10.1145\/3018661.3018669","relation":{},"subject":[],"published":{"date-parts":[[2017,2,2]]},"assertion":[{"value":"2017-02-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}