{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:26:59Z","timestamp":1725985619692},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319973036"},{"type":"electronic","value":"9783319973043"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-97304-3_80","type":"book-chapter","created":{"date-parts":[[2018,7,26]],"date-time":"2018-07-26T18:34:06Z","timestamp":1532630046000},"page":"1044-1057","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Establishing Connections in a Social Network"],"prefix":"10.1007","author":[{"given":"Yanni","family":"Tang","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0824-0899","authenticated-orcid":false,"given":"Jiamou","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhuoxing","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,27]]},"reference":[{"issue":"4","key":"80_CR1","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1016\/j.socnet.2005.11.005","volume":"28","author":"SP Borgatti","year":"2006","unstructured":"Borgatti, S.P., Everett, M.G.: A graph-theoretic perspective on centrality. Soc. Netw. 28(4), 466\u2013484 (2006)","journal-title":"Soc. Netw."},{"key":"80_CR2","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 199\u2013208 (2009)","DOI":"10.1145\/1557019.1557047"},{"key":"80_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-319-20086-6_4","volume-title":"Experimental Algorithms","author":"P Crescenzi","year":"2015","unstructured":"Crescenzi, P., D\u2019Angelo, G., Severini, L., Velaj, Y.: Greedily Improving Our Own Centrality in A Network. In: Bampis, E. (ed.) SEA 2015. LNCS, vol. 9125, pp. 43\u201355. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-20086-6_4"},{"key":"80_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-540-69407-6_15","volume-title":"Logic and Theory of Algorithms","author":"BF Csima","year":"2008","unstructured":"Csima, B.F., Khoussainov, B., Liu, J.: Computable categoricity of graphs with finite components. In: Beckmann, A., Dimitracopoulos, C., L\u00f6we, B. (eds.) CiE 2008. LNCS, vol. 5028, pp. 139\u2013148. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-69407-6_15"},{"issue":"1","key":"80_CR5","doi-asserted-by":"publisher","first-page":"35","DOI":"10.2307\/3033543","volume":"40","author":"LC Freeman","year":"1977","unstructured":"Freeman, L.C.: A set of measures of centrality based on betweenness. Sociometry 40(1), 35\u201341 (1977)","journal-title":"Sociometry"},{"issue":"2","key":"80_CR6","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1287\/orsc.11.2.183.12514","volume":"11","author":"M Gargiulo","year":"2000","unstructured":"Gargiulo, M., Benassi, M.: Trapped in your own net? Network cohesion, structural holes, and the adaptation of social capital. Organ. Sci. 11(2), 183\u2013196 (2000)","journal-title":"Organ. Sci."},{"issue":"6","key":"80_CR7","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"MS Granovetter","year":"1973","unstructured":"Granovetter, M.S.: The strength of weak ties. Am. J. Sociol. 78(6), 1360\u20131380 (1973)","journal-title":"Am. J. Sociol."},{"key":"80_CR8","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146 (2003)","DOI":"10.1145\/956750.956769"},{"key":"80_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-642-03816-7_41","volume-title":"Mathematical Foundations of Computer Science 2009","author":"B Khoussainov","year":"2009","unstructured":"Khoussainov, B., Liu, J., Khaliq, I.: A dynamic algorithm for reachability games played on trees. In: Kr\u00e1lovi\u010d, R., Niwi\u0144ski, D. (eds.) MFCS 2009. LNCS, vol. 5734, pp. 477\u2013488. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03816-7_41"},{"issue":"3","key":"80_CR10","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1486877.1486888","volume":"7","author":"J Kleinberg","year":"2008","unstructured":"Kleinberg, J., Suri, S., Wexler, T.: Strategic network formation with structural holes. ACM SIGecom Exch. 7(3), 11 (2008)","journal-title":"ACM SIGecom Exch."},{"key":"80_CR11","doi-asserted-by":"crossref","unstructured":"Liu, J., Wei, Z.: Community detection based on graph dynamical systems with asynchronous runs. In: Computing and Networking (CANDAR) Second International Symposium on 2014, pp. 463\u2013469. IEEE (2014)","DOI":"10.1109\/CANDAR.2014.20"},{"key":"80_CR12","doi-asserted-by":"crossref","unstructured":"Liu, J., Wei, Z.: Network, popularity and social cohesion: a game-theoretic approach. In: AAAI, pp. 600\u2013606 (2017)","DOI":"10.1609\/aaai.v31i1.10568"},{"key":"80_CR13","doi-asserted-by":"crossref","unstructured":"L\u00fc, L., Chen, D., Ren, X.L., Zhang, Q.M., Zhang, Y.C., Zhou, T.: Vital nodes identification in complex networks. Physics reports, vol. 650, pp. 1\u201363 (2016)","DOI":"10.1016\/j.physrep.2016.06.007"},{"key":"80_CR14","unstructured":"Moskvina, A., Liu, J.: How to build your network? A structural analysis. In: Proceedings of IJCAI 2016 (2016)"},{"key":"80_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-319-42345-6_4","volume-title":"Computational Social Networks","author":"A Moskvina","year":"2016","unstructured":"Moskvina, A., Liu, J.: Integrating networks of equipotent nodes. In: Nguyen, H.T.T., Snasel, V. (eds.) CSoNet 2016. LNCS, vol. 9795, pp. 39\u201350. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-42345-6_4"},{"key":"80_CR16","doi-asserted-by":"crossref","unstructured":"Moskvina, A., Liu, J.: Togetherness: an algorithmic approach to network integration. In: IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, pp. 223\u2013230 (2016)","DOI":"10.1109\/ASONAM.2016.7752239"},{"key":"80_CR17","doi-asserted-by":"crossref","unstructured":"Puzis, R., Zilberman, P., Elovici, Y., Dolev, S., Brandes, U.: Heuristics for speeding up betweenness centrality computation. In: Privacy, Security, Risk and Trust, pp. 302\u2013311 (2012)","DOI":"10.1109\/SocialCom-PASSAT.2012.66"},{"key":"80_CR18","doi-asserted-by":"crossref","unstructured":"Rossi, R., Ahmed, K.: The network data repository with interactive graph analytics and visualization. In: Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence (2015)","DOI":"10.1609\/aaai.v29i1.9277"},{"key":"80_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-319-68783-4_6","volume-title":"Web Information Systems Engineering \u2013 WISE 2017","author":"B Yan","year":"2017","unstructured":"Yan, B., Chen, Y., Liu, J.: Dynamic relationship building: exploitation versus exploration on a social network. In: Bouguettaya, A., et al. (eds.) WISE 2017. LNCS, vol. 10569, pp. 75\u201390. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68783-4_6"},{"key":"80_CR20","doi-asserted-by":"crossref","unstructured":"Yan, B., Liu, Y., Liu, J., Cai, Y., Su, H., Zheng, H.: From the periphery to the center: information brokerage in an evolving network. arXiv preprint arXiv:1805.00751 (2018)","DOI":"10.24963\/ijcai.2018\/544"}],"container-title":["Lecture Notes in Computer Science","PRICAI 2018: Trends in Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-97304-3_80","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,28]],"date-time":"2022-08-28T07:39:17Z","timestamp":1661672357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-97304-3_80"}},"subtitle":["Radial Versus Medial Centrality Indices"],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319973036","9783319973043"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-97304-3_80","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}