-
1
-
-
77950897279
-
Twitterrank: Finding topicsensitive influential twitterers
-
J. Weng, E.-P. Lim, J. Jiang, and Q. He, "Twitterrank: finding topicsensitive influential twitterers," in Proc. 3rd ACM International Conference on Web Search and Data Mining, 2010, pp. 261-270.
-
(2010)
Proc. 3rd ACM International Conference on Web Search and Data Mining
, pp. 261-270
-
-
Weng, J.1
Lim, E.-P.2
Jiang, J.3
He, Q.4
-
2
-
-
84890768200
-
Measuring user influence in twitter: The million follower fallacy
-
M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi, "Measuring user influence in Twitter: the million follower fallacy," in Proc. 4th International AAAI Conference on Weblogs and Social Media (ICWSM), 2010.
-
(2010)
Proc. 4th International AAAI Conference on Weblogs and Social Media (ICWSM)
-
-
Cha, M.1
Haddadi, H.2
Benevenuto, F.3
Gummadi, K.P.4
-
3
-
-
79952397059
-
Everyone's an influencer: Quantifying influence on twitter
-
E. Bakshy, J. M. Hofman, W. A. Mason, and D. J. Watts, "Everyone's an influencer: quantifying influence on Twitter," in Proc. 4th ACM International Conference on Web Search and Data Mining, 2011, pp. 65-74.
-
(2011)
Proc. 4th ACM International Conference on Web Search and Data Mining
, pp. 65-74
-
-
Bakshy, E.1
Hofman, J.M.2
Mason, W.A.3
Watts, D.J.4
-
4
-
-
77954811294
-
Identifying key users for targeted marketing by mining online social network
-
Y. Zhang, Z. Wang, and C. Xia, "Identifying key users for targeted marketing by mining online social network," in Proc. IEEE 24th Int Advanced Information Networking and Applications Workshops (WAINA) Conf, 2010, pp. 644-649.
-
(2010)
Proc. IEEE 24th Int Advanced Information Networking and Applications Workshops (WAINA) Conf
, pp. 644-649
-
-
Zhang, Y.1
Wang, Z.2
Xia, C.3
-
5
-
-
80052039199
-
Determining content power users in a blog network: An approach and its applications
-
S.-H. Lim, S.-W. Kim, S. Park, and J. H. Lee, "Determining content power users in a blog network: an approach and its applications," IEEE Trans. Syst., Man, Cybern. A, vol. 41, no. 5, pp. 853-862, 2011.
-
(2011)
IEEE Trans. Syst., Man, Cybern. A
, vol.41
, Issue.5
, pp. 853-862
-
-
Lim, S.-H.1
Kim, S.-W.2
Park, S.3
Lee, J.H.4
-
6
-
-
80052061910
-
Identifying the productive and influential bloggers in a community
-
L. Akritidis, D. Katsaros, and P. Bozanis, "Identifying the productive and influential bloggers in a community," IEEE Trans. Syst., Man, Cybern. C, vol. 41, no. 5, pp. 759-764, 2011.
-
(2011)
IEEE Trans. Syst., Man, Cybern. C
, vol.41
, Issue.5
, pp. 759-764
-
-
Akritidis, L.1
Katsaros, D.2
Bozanis, P.3
-
7
-
-
52049113703
-
Source tracing and pursuing of network virus
-
L. Han, S. Han, Q. Deng, J. Yu, and Y. He, "Source tracing and pursuing of network virus," in Proc. 8th IEEE International Conference on Computer and Information Technology Workshops, 2008, pp. 230-235.
-
(2008)
Proc. 8th IEEE International Conference on Computer and Information Technology Workshops
, pp. 230-235
-
-
Han, L.1
Han, S.2
Deng, Q.3
Yu, J.4
He, Y.5
-
8
-
-
77955399282
-
Efficient mitigation strategies for epidemics in rural regions
-
C. Scoglio, W. Schumm, P. Schumm, T. Easton, S. Roy Chowdhury, A. Sydney, and M. Youssef, "Efficient mitigation strategies for epidemics in rural regions," PLoS ONE, vol. 5, no. 7, 2010.
-
(2010)
PLoS ONE
, vol.5
, Issue.7
-
-
Scoglio, C.1
Schumm, W.2
Schumm, P.3
Easton, T.4
Roy Chowdhury, S.5
Sydney, A.6
Youssef, M.7
-
9
-
-
37649028224
-
Finding and evaluating community structure in networks
-
M. Newman and M. Girvan, "Finding and evaluating community structure in networks," Phys. Rev. E, vol. 69, no. 2, 2004.
-
(2004)
Phys. Rev. E
, vol.69
, Issue.2
-
-
Newman, M.1
Girvan, M.2
-
12
-
-
33747172362
-
Maximizing the spread of influence through a social network
-
D. Kempe, J. Kleinberg, and E. Tardos, "Maximizing the spread of influence through a social network," in Proc. 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2003, pp. 137-146.
-
(2003)
Proc. 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 137-146
-
-
Kempe, D.1
Kleinberg, J.2
Tardos, E.3
-
13
-
-
79961005336
-
Rumors in a network: Who's the culprit?
-
D. Shah and T. Zaman, "Rumors in a network: Who's the culprit?" IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 5163-5181, 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 5163-5181
-
-
Shah, D.1
Zaman, T.2
-
14
-
-
34147175951
-
Distributed sequential Bayesian estimation of a diffusive source in wireless sensor networks
-
DOI 10.1109/TSP.2006.889975
-
T. Zhao and A. Nehorai, "Distributed sequential Bayesian estimation of a diffusive source in wireless sensor networks," IEEE Trans. Signal Process., vol. 55, no. 4, pp. 1511-1524, 2007. (Pubitemid 46563171)
-
(2007)
IEEE Transactions on Signal Processing
, vol.55
, Issue.4
, pp. 1511-1524
-
-
Zhao, T.1
Nehorai, A.2
-
15
-
-
34247891527
-
Detection and localization of material releases with sparse sensor configurations
-
DOI 10.1109/TSP.2006.890914
-
E. B. Fox, J. W. Fisher, and A. S. Willsky, "Detection and localization of material releases with sparse sensor configurations," IEEE Trans. Signal Process., vol. 55, no. 5, pp. 1886-1898, 2007. (Pubitemid 46691636)
-
(2007)
IEEE Transactions on Signal Processing
, vol.55
, Issue.5
, pp. 1886-1898
-
-
Fox, E.B.1
Fisher, J.W.2
Willsky, A.S.3
-
16
-
-
70349636538
-
Bayesian detection in bounded height tree networks
-
W. P. Tay, J. N. Tsitsiklis, and M. Z. Win, "Bayesian detection in bounded height tree networks," IEEE Trans. Signal Process., vol. 57, no. 10, pp. 4042-4051, 2009.
-
(2009)
IEEE Trans. Signal Process.
, vol.57
, Issue.10
, pp. 4042-4051
-
-
Tay, W.P.1
Tsitsiklis, J.N.2
Win, M.Z.3
-
18
-
-
0013987194
-
The centrality index of a graph
-
G. Sabidussi, "The centrality index of a graph," Psychometrika, vol. 31, no. 4, pp. 581-603, 1966.
-
(1966)
Psychometrika
, vol.31
, Issue.4
, pp. 581-603
-
-
Sabidussi, G.1
|