{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:35:27Z","timestamp":1730316927382,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,2,24]]},"DOI":"10.1145\/2556195.2556263","type":"proceedings-article","created":{"date-parts":[[2014,2,18]],"date-time":"2014-02-18T09:10:41Z","timestamp":1392714641000},"page":"423-432","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Effective co-betweenness centrality computation"],"prefix":"10.1145","author":[{"given":"Mostafa","family":"Haghir Chehreghani","sequence":"first","affiliation":[{"name":"Department of Computer Science, KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2014,2,24]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1126\/science.286.5439.509"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1111\/j.1468-0262.2006.00709.x"},{"key":"e_1_3_2_1_3_1","volume-title":"Betweenness centrality in large complex networks. The Europ. Phys. J. B - Condensed Matter 38, 2(Mar.), 163--168","author":"Barthelemy M.","year":"2004","unstructured":"M. Barthelemy , Betweenness centrality in large complex networks. The Europ. Phys. J. B - Condensed Matter 38, 2(Mar.), 163--168 , 2004 . M. Barthelemy, Betweenness centrality in large complex networks. The Europ. Phys. J. B - Condensed Matter 38, 2(Mar.), 163--168, 2004."},{"key":"e_1_3_2_1_4_1","volume-title":"Sunbelt International Social Networks Conference","author":"Borgatti S. P.","year":"2002","unstructured":"S. P. Borgatti , Types of network flows and how to destabilize terrorist networks , Sunbelt International Social Networks Conference , New Orleans , 2002 . S. P. Borgatti, Types of network flows and how to destabilize terrorist networks, Sunbelt International Social Networks Conference, New Orleans, 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1016\/j.socnet.2004.11.008"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/s10588-006-7084-x"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1080\/0022250X.2001.9990249"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1016\/j.socnet.2007.11.001"},{"issue":"2","key":"e_1_3_2_1_9_1","first-page":"37","article-title":"What can you do with a web in your pocket?","volume":"21","author":"Brin S.","year":"1998","unstructured":"S. Brin , R. Motwani , L. Page and T. Winograd , What can you do with a web in your pocket? IEEE Bulletin of the Technical Committee on Data Engineering , 21 ( 2 ), 37 -- 47 , 1998 . S. Brin, R. Motwani, L. Page and T. Winograd, What can you do with a web in your pocket? IEEE Bulletin of the Technical Committee on Data Engineering, 21(2), 37--47, 1998.","journal-title":"IEEE Bulletin of the Technical Committee on Data Engineering"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1016\/j.jnca.2011.06.001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1734213.1734219"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1080\/0022250X.1999.9990219"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.2307\/3033543"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1016\/0378-8733(78)90021-7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1016\/0378-8733(91)90017-N"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1073\/pnas.122653799"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1142\/S0219525903000803"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/324133.324140"},{"key":"e_1_3_2_1_19_1","volume-title":"Sorting by Merging, Sorting and Searching. The Art of Computer Programming 3","author":"Knuth D.","unstructured":"D. Knuth , Section 5.2.4 : Sorting by Merging, Sorting and Searching. The Art of Computer Programming 3 ( 2 nd ed.), Addison-Wesley , 158--168, 998. D. Knuth, Section 5.2.4: Sorting by Merging, Sorting and Searching. The Art of Computer Programming 3 (2nd ed.), Addison-Wesley, 158--168, 998.","edition":"2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1016\/j.socnet.2009.02.003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1016\/j.physa.2006.01.051"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/1081870.1081893"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1217299.1217301"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.5555\/646491.694954"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.5555\/1784462.1784487"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1007\/s00265-003-0651-y"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1109\/DASC.2009.130"},{"key":"e_1_3_2_1_28_1","first-page":"548","volume-title":"NIPS","author":"McAuley J.","year":"2012","unstructured":"J. McAuley and J. Leskovec , Learning to discover social circles in ego networks , NIPS , pages 548 -- 556 . 2012 . J. McAuley and J. Leskovec, Learning to discover social circles in ego networks, NIPS, pages 548--556. 2012."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1016\/j.socnet.2004.11.009"},{"key":"e_1_3_2_1_30_1","volume-title":"Visualization and Analysis of the Telecommunications and Media Ownership Network. Proceedings of International Telecommunications Society 14th Biennial Conference (ITS2002)","author":"Norlen K.","year":"2002","unstructured":"K. Norlen , G. Lucas , M. Gebbie and J. Chuang , EVA: Extraction , Visualization and Analysis of the Telecommunications and Media Ownership Network. Proceedings of International Telecommunications Society 14th Biennial Conference (ITS2002) , Seoul Korea , August 2002 . K. Norlen, G. Lucas, M. Gebbie and J. Chuang, EVA: Extraction, Visualization and Analysis of the Telecommunications and Media Ownership Network. Proceedings of International Telecommunications Society 14th Biennial Conference (ITS2002), Seoul Korea, August 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1109\/TVCG.2006.122"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1103\/PhysRevE.76.056709"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.5555\/1365534.1365539"},{"key":"e_1_3_2_1_34_1","volume-title":"ODLIS: Online Dictionary of Library and Information Science","author":"Reitz J. M.","year":"2002","unstructured":"J. M. Reitz , ODLIS: Online Dictionary of Library and Information Science , 2002 . J. M. Reitz, ODLIS: Online Dictionary of Library and Information Science, 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1103\/PhysRevE.73.046108"}],"event":{"sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"acronym":"WSDM 2014","name":"WSDM 2014: Seventh ACM International Conference on Web Search and Data Mining","location":"New York New York USA"},"container-title":["Proceedings of the 7th ACM international conference on Web search and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2556195.2556263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T19:47:11Z","timestamp":1673466431000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2556195.2556263"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,24]]},"references-count":35,"alternative-id":["10.1145\/2556195.2556263","10.1145\/2556195"],"URL":"https:\/\/doi.org\/10.1145\/2556195.2556263","relation":{},"subject":[],"published":{"date-parts":[[2014,2,24]]},"assertion":[{"value":"2014-02-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}