{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:37Z","timestamp":1750306477797,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,25]],"date-time":"2015-08-25T00:00:00Z","timestamp":1440460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["SFRH\/BD\/72697\/2010"],"award-info":[{"award-number":["SFRH\/BD\/72697\/2010"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,25]]},"DOI":"10.1145\/2808797.2808909","type":"proceedings-article","created":{"date-parts":[[2015,11,13]],"date-time":"2015-11-13T14:56:02Z","timestamp":1447426562000},"page":"137-144","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Pairwise structural role mining for user categorization in information cascades"],"prefix":"10.1145","author":[{"given":"Sarvenaz","family":"Choobdar","sequence":"first","affiliation":[{"name":"CRACS and INESC-TEC, Faculty of Sciences, University of Porto, Portugal"}]},{"given":"Pedro","family":"Ribeiro","sequence":"additional","affiliation":[{"name":"CRACS and INESC-TEC, Faculty of Sciences, University of Porto, Portugal"}]},{"given":"Fernando","family":"Silva","sequence":"additional","affiliation":[{"name":"CRACS and INESC-TEC, Faculty of Sciences, University of Porto, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2015,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487597"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339723"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487620"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433479"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1209\/0295-5075\/87\/18008"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(78)90005-5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188234"},{"key":"e_1_3_2_1_8_1","volume-title":"ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining","author":"Danilevsky M.","year":"2013","unstructured":"M. Danilevsky , C. Wang , N. Desai , and J. Han , \" Entity role discovery in hierarchical topical communities,\" in Proc . ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining , 2013 . M. Danilevsky, C. Wang, N. Desai, and J. Han, \"Entity role discovery in hierarchical topical communities,\" in Proc. ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, 2013."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85567-5_9"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718518"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772842"},{"key":"e_1_3_2_1_14_1","volume-title":"AAAI Int. Conf. on Weblogs and Social Media","volume":"10","author":"Cha M.","year":"2010","unstructured":"M. Cha , H. Haddadi , F. Benevenuto , and P. K. Gummadi , \" Measuring user influence in twitter: The million follower fallacy.\" in Proc . AAAI Int. Conf. on Weblogs and Social Media , vol. 10 , 2010 . M. Cha, H. Haddadi, F. Benevenuto, and P. K. Gummadi, \"Measuring user influence in twitter: The million follower fallacy.\" in Proc. AAAI Int. Conf. on Weblogs and Social Media, vol. 10, 2010."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935845"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341559"},{"key":"e_1_3_2_1_17_1","volume-title":"Influence and passivity in social media,\" in Proc. of the ECML\/PKDD","author":"Romero D. M.","year":"2011","unstructured":"D. M. Romero , W. Galuba , S. Asur , and B. A. Huberman , \" Influence and passivity in social media,\" in Proc. of the ECML\/PKDD , 2011 . D. M. Romero, W. Galuba, S. Asur, and B. A. Huberman, \"Influence and passivity in social media,\" in Proc. of the ECML\/PKDD, 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.10.020"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487640"},{"key":"e_1_3_2_1_20_1","volume-title":"Social contagion: An empirical study of information spread on digg and twitter follower graphs,\" arXiv preprint arXiv:1202.3162","author":"Lerman K.","year":"2012","unstructured":"K. Lerman , R. Ghosh , and T. Surachawala , \" Social contagion: An empirical study of information spread on digg and twitter follower graphs,\" arXiv preprint arXiv:1202.3162 , 2012 . K. Lerman, R. Ghosh, and T. Surachawala, \"Social contagion: An empirical study of information spread on digg and twitter follower graphs,\" arXiv preprint arXiv:1202.3162, 2012."},{"key":"e_1_3_2_1_21_1","volume-title":"Morgan Kaufmann","author":"Pearl J.","year":"1988","unstructured":"J. Pearl , Probabilistic reasoning in intelligent systems: networks of plausible inference . Morgan Kaufmann , 1988 . J. Pearl, Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan Kaufmann, 1988."},{"key":"e_1_3_2_1_22_1","series-title":"Series B (Methodological)","volume-title":"Maximum likelihood from incomplete data via the em algorithm,\" Journal of the Royal Statistical Society","author":"Dempster A. P.","year":"1977","unstructured":"A. P. Dempster , N. M. Laird , and D. B. Rubin , \" Maximum likelihood from incomplete data via the em algorithm,\" Journal of the Royal Statistical Society . Series B (Methodological) , 1977 . A. P. Dempster, N. M. Laird, and D. B. Rubin, \"Maximum likelihood from incomplete data via the em algorithm,\" Journal of the Royal Statistical Society. Series B (Methodological), 1977."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2005.s54"},{"key":"e_1_3_2_1_24_1","volume-title":"Discovering molecular pathways from protein interaction and gene expression data,\" Bioinformatics","author":"Segal E.","year":"2003","unstructured":"E. Segal , H. Wang , and D. Koller , \" Discovering molecular pathways from protein interaction and gene expression data,\" Bioinformatics , vol. 19 , 2003 . E. Segal, H. Wang, and D. Koller, \"Discovering molecular pathways from protein interaction and gene expression data,\" Bioinformatics, vol. 19, 2003."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1986.tb01412.x"},{"key":"e_1_3_2_1_26_1","volume-title":"Hidden markov random field model for segmentation of brain mr image,\" in Medical Imaging","author":"Zhang Y.","year":"2000","unstructured":"Y. Zhang , J. M. Brady , and S. Smith , \" Hidden markov random field model for segmentation of brain mr image,\" in Medical Imaging 2000 . International Society for Optics and Photonics , 2000. Y. Zhang, J. M. Brady, and S. Smith, \"Hidden markov random field model for segmentation of brain mr image,\" in Medical Imaging 2000. International Society for Optics and Photonics, 2000."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0402-5"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020512"},{"volume-title":"Collective dynamics of 'small-world' networks,\" Nature","author":"Watts D. J.","key":"e_1_3_2_1_29_1","unstructured":"D. J. Watts and S. H. Strogatz , \" Collective dynamics of 'small-world' networks,\" Nature , vol. 393 , no. 6684, Jun. 1998. D. J. Watts and S. H. Strogatz, \"Collective dynamics of 'small-world' networks,\" Nature, vol. 393, no. 6684, Jun. 1998."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526806"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2579231"},{"key":"e_1_3_2_1_32_1","volume-title":"The role of hidden influentials in the diffusion of online information cascades,\" EPJ Data Science","author":"Ba\u00f1os R. A.","year":"2013","unstructured":"R. A. Ba\u00f1os , J. Borge-Holthoefer , and Y. Moreno , \" The role of hidden influentials in the diffusion of online information cascades,\" EPJ Data Science , vol. 2 , 2013 . R. A. Ba\u00f1os, J. Borge-Holthoefer, and Y. Moreno, \"The role of hidden influentials in the diffusion of online information cascades,\" EPJ Data Science, vol. 2, 2013."},{"key":"e_1_3_2_1_33_1","volume-title":"Diffusion of innovations","author":"Rogers E. M.","year":"2010","unstructured":"E. M. Rogers , Diffusion of innovations . Simon and Schuster , 2010 . E. M. Rogers, Diffusion of innovations. Simon and Schuster, 2010."},{"volume-title":"Locating privileged spreaders on an online social network,\" Physical review E","author":"Borge-Holthoefer J.","key":"e_1_3_2_1_34_1","unstructured":"J. Borge-Holthoefer , A. Rivero , and Y. Moreno , \" Locating privileged spreaders on an online social network,\" Physical review E , vol. 85 , no. 6, 2012. J. Borge-Holthoefer, A. Rivero, and Y. Moreno, \"Locating privileged spreaders on an online social network,\" Physical review E, vol. 85, no. 6, 2012."}],"event":{"name":"ASONAM '15: Advances in Social Networks Analysis and Mining 2015","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"],"location":"Paris France","acronym":"ASONAM '15"},"container-title":["Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2015"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808797.2808909","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808797.2808909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:15Z","timestamp":1750225695000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808797.2808909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,25]]},"references-count":34,"alternative-id":["10.1145\/2808797.2808909","10.1145\/2808797"],"URL":"https:\/\/doi.org\/10.1145\/2808797.2808909","relation":{},"subject":[],"published":{"date-parts":[[2015,8,25]]},"assertion":[{"value":"2015-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}