skip to main content
Skip header Section
Networks: An IntroductionMay 2010
Publisher:
  • Oxford University Press, Inc.
  • 198 Madison Ave. New York, NY
  • United States
ISBN:978-0-19-920665-0
Published:20 May 2010
Pages:
720
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

The scientific study of networks, including computer networks, social networks, and biological networks, has received an enormous amount of interest in the last few years. The rise of the Internet and the wide availability of inexpensive computers have made it possible to gather and analyze network data on a large scale, and the development of a variety of new theoretical tools has allowed us to extract new knowledge from many different kinds of networks.The study of networks is broadly interdisciplinary and important developments have occurred in many fields, including mathematics, physics, computer and information sciences, biology, and the social sciences. This book brings together for the first time the most important breakthroughs in each of these fields and presents them in a coherent fashion, highlighting the strong interconnections between work in different areas. Subjects covered include the measurement and structure of networks in many branches of science, methods for analyzing network data, including methods developed in physics, statistics, and sociology, the fundamentals of graph theory, computer algorithms, and spectral methods, mathematical models of networks, including random graph models and generative models, and theories of dynamical processes taking place on networks.

Cited By

  1. Tuncer A and Gezici F (2024). Influence of proximities and their interaction effects on scientific collaborations: the case of Turkish regions, Scientometrics, 129:3, (1277-1298), Online publication date: 1-Mar-2024.
  2. Noschese S and Reichel L (2024). Network analysis with the aid of the path length matrix, Numerical Algorithms, 95:1, (451-470), Online publication date: 1-Jan-2024.
  3. Lagos T, Prokopyev O and Veremyev A (2024). Finding groups with maximum betweenness centrality via integer programming with random path sampling, Journal of Global Optimization, 88:1, (199-232), Online publication date: 1-Jan-2024.
  4. ACM
    Meshcheryakova N and Shvydun S Perturbation Analysis of Centrality Measures Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, (407-414)
  5. Aymanns C, Georg C and Golub B (2023). Exit Spirals in Coupled Networked Markets, Operations Research, 71:5, (1472-1497), Online publication date: 1-Sep-2023.
  6. Wąs T and Skibski O (2023). Axiomatic characterization of PageRank, Artificial Intelligence, 318:C, Online publication date: 1-May-2023.
  7. Ding Z, Cao L, Chen L, Sun D, Zhang X and Tao Z (2023). Large-scale multimodal multiobjective evolutionary optimization based on hybrid hierarchical clustering, Knowledge-Based Systems, 266:C, Online publication date: 22-Apr-2023.
  8. Wang S and Tan X (2023). Finding robust influential seeds from networked systems against structural failures using a niching memetic algorithm, Applied Soft Computing, 136:C, Online publication date: 1-Mar-2023.
  9. ACM
    Roy S, Ghosh P, Ghosh N and Das S (2021). Transcriptional Regulatory Network Topology with Applications to Bio-inspired Networking: A Survey, ACM Computing Surveys, 54:8, (1-36), Online publication date: 30-Nov-2022.
  10. ACM
    Burtner S and Murray A (2022). COVID-19 and Minimizing Micro-Spatial Interactions, ACM Transactions on Spatial Algorithms and Systems, 8:3, (1-17), Online publication date: 30-Sep-2022.
  11. Hou J, Chen S, Long H and Li Q (2022). Research and Analysis of Influence Maximization Techniques in Online Network Communities Based on Social Big Data, Journal of Organizational and End User Computing, 34:10, (1-23), Online publication date: 24-Jun-2022.
  12. Wang W, Li W, Lin T, Wu T, Pan L and Liu Y (2022). Generalized k-core percolation on higher-order dependent networks, Applied Mathematics and Computation, 420:C, Online publication date: 1-May-2022.
  13. ACM
    Oettershagen L, Mutzel P and Kriege N Temporal Walk Centrality: Ranking Nodes in Evolving Networks Proceedings of the ACM Web Conference 2022, (1640-1650)
  14. Sarti S, Adair J and Ochoa G Neuroevolution Trajectory Networks of the Behaviour Space Applications of Evolutionary Computation, (685-703)
  15. Gul S, Räbiger S and Saygın Y (2022). Context-based extraction of concepts from unstructured textual documents, Information Sciences: an International Journal, 588:C, (248-264), Online publication date: 1-Apr-2022.
  16. Siudak D (2022). A network analysis of the value migration process on the financial market. The effect of value migration network structure on stock returns, Expert Systems with Applications: An International Journal, 191:C, Online publication date: 1-Apr-2022.
  17. ACM
    Qasem A, Shirani P, Debbabi M, Wang L, Lebel B and Agba B (2021). Automatic Vulnerability Detection in Embedded Devices and Firmware, ACM Computing Surveys, 54:2, (1-42), Online publication date: 31-Mar-2022.
  18. Fu Y, Marques M, Tseng Y, Powell J and Baker D (2022). An evolving international research collaboration network: spatial and thematic developments in co-authored higher education research, 1998–2018, Scientometrics, 127:3, (1403-1429), Online publication date: 1-Mar-2022.
  19. De la Cruz Cabrera O, Jin J, Noschese S and Reichel L (2021). Communication in complex networks, Applied Numerical Mathematics, 172:C, (186-205), Online publication date: 1-Feb-2022.
  20. Kizhakkedath A and Tai K (2021). Vulnerability analysis of critical infrastructure network, International Journal of Critical Infrastructure Protection, 35:C, Online publication date: 1-Dec-2021.
  21. Aksentijevic A, Mihailović A and Mihailović D (2021). A novel approach to the study of spatio-temporal brain dynamics using change-based complexity, Applied Mathematics and Computation, 410:C, Online publication date: 1-Dec-2021.
  22. You G and Leung S (2021). Eulerian algorithms for computing some Lagrangian flow network quantities, Journal of Computational Physics, 445:C, Online publication date: 15-Nov-2021.
  23. ACM
    Polychronopoulou A, Zhou F and Obradovic Z Cosine similarity for multiplex network summarization Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (56-63)
  24. Bai L, Han X, Wang H, Zhang K and Sun Y (2021). A method of network robustness under strategic goals for project portfolio selection, Computers and Industrial Engineering, 161:C, Online publication date: 1-Nov-2021.
  25. ACM
    Zeng W, Zhao X, Tang J and Fan C Reinforced Active Entity Alignment Proceedings of the 30th ACM International Conference on Information & Knowledge Management, (2477-2486)
  26. ACM
    Liu Z, Li H, Li R, Zeng Y and Ma J Graph Embedding Based on Euclidean Distance Matrix and its Applications Proceedings of the 30th ACM International Conference on Information & Knowledge Management, (1140-1149)
  27. ACM
    Lai D, Liu Z, Huang J, Chong Z, Wu W and Nardini C Attention Based Subgraph Classification for Link Prediction by Network Re-weighting Proceedings of the 30th ACM International Conference on Information & Knowledge Management, (3171-3175)
  28. Santos F, Aquino A, Madeira E and Cabral R (2022). Temporal complex networks modeling applied to vehicular ad-hoc networks, Journal of Network and Computer Applications, 192:C, Online publication date: 15-Oct-2021.
  29. Giovanidis A, Baynat B, Magnien C and Vendeville A (2021). Ranking Online Social Users by Their Influence, IEEE/ACM Transactions on Networking, 29:5, (2198-2214), Online publication date: 1-Oct-2021.
  30. Salha G, Hennequin R, Remy J, Moussallam M and Vazirgiannis M (2022). FastGAE, Neural Networks, 142:C, (1-19), Online publication date: 1-Oct-2021.
  31. Wu S, Cao H, Zhao H, Hu Y, Yang L, Yin H and Zhu H (2021). A softwarized resource allocation framework for security and location guaranteed services in B5G networks, Computer Communications, 178:C, (26-36), Online publication date: 1-Oct-2021.
  32. Wu J, Liu J, Zhao Y and Zheng Z (2021). Analysis of cryptocurrency transactions from a network perspective, Journal of Network and Computer Applications, 190:C, Online publication date: 15-Sep-2021.
  33. Ochoa G, Malan K and Blum C (2021). Search trajectory networks, Applied Soft Computing, 109:C, Online publication date: 1-Sep-2021.
  34. Reis Pinheiro C, Galati M, Summerville N and Lambrecht M (2021). Using Network Analysis and Machine Learning to Identify Virus Spread Trends in COVID-19, Big Data Research, 25:C, Online publication date: 15-Jul-2021.
  35. ACM
    Fragkou E, Katsaros D and Manolopoulos Y Sink Group Betweenness Centrality Proceedings of the 25th International Database Engineering & Applications Symposium, (21-26)
  36. ACM
    Fu Z, Xian Y, Zhu Y, Xu S, Li Z, de Melo G and Zhang Y HOOPS: Human-in-the-Loop Graph Reasoning for Conversational Recommendation Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, (2415-2421)
  37. ACM
    Friedemann W, Friedrich T, Gawendowicz H, Lenzner P, Melnichenko A, Peters J, Stephan D and Vaichenker M Efficiency and Stability in Euclidean Network Design Proceedings of the 33rd ACM Symposium on Parallelism in Algorithms and Architectures, (232-242)
  38. Wu J, Wang K, He C, Huang X and Dong K (2021). Characterizing the patterns of China's policies against COVID-19, Information Processing and Management: an International Journal, 58:4, Online publication date: 1-Jul-2021.
  39. ACM
    Tiano D, Bonifati A and Ng R FeatTS: Feature-based Time Series Clustering Proceedings of the 2021 International Conference on Management of Data, (2784-2788)
  40. Malik N, Spencer D and Bui Q (2021). Power in the U.S. political economy, Journal of the Association for Information Science and Technology, 72:7, (811-823), Online publication date: 9-Jun-2021.
  41. Wang S, Liu J and Jin Y (2021). A Computationally Efficient Evolutionary Algorithm for Multiobjective Network Robustness Optimization, IEEE Transactions on Evolutionary Computation, 25:3, (419-432), Online publication date: 1-Jun-2021.
  42. ACM
    Wang R, Mou S, Wang X, Xiao W, Ju Q, Shi C and Xie X Graph Structure Estimation Neural Networks Proceedings of the Web Conference 2021, (342-353)
  43. Siami M, Bamieh B, Bolouki S and Motee N Notions of centrality in consensus protocols with structured uncertainties 2016 IEEE 55th Conference on Decision and Control (CDC), (3542-3547)
  44. ACM
    Ruiz-Martin C, Wainer G and Lopez-Paredes A (2020). Discrete-Event Modeling and Simulation of Diffusion Processes in Multiplex Networks, ACM Transactions on Modeling and Computer Simulation, 31:1, (1-32), Online publication date: 1-Feb-2021.
  45. Lu J, Sun D and Pan J (2021). Spatiotemporal Evolution and Complexity of Urban Networks in China, 1978–2019, Complexity, 2021, Online publication date: 1-Jan-2021.
  46. Bertotti M, Modanese G and Zhu X (2021). Diagonal Degree Correlations vs. Epidemic Threshold in Scale-Free Networks, Complexity, 2021, Online publication date: 1-Jan-2021.
  47. Zhang C, Shang K, Qiao J and Selişteanu D (2021). Adaptive Similarity Function with Structural Features of Network Embedding for Missing Link Prediction, Complexity, 2021, Online publication date: 1-Jan-2021.
  48. Jedh M, Ben Othmane L, Ahmed N and Bhargava B (2021). Detection of Message Injection Attacks Onto the CAN Bus Using Similarities of Successive Messages-Sequence Graphs, IEEE Transactions on Information Forensics and Security, 16, (4133-4146), Online publication date: 1-Jan-2021.
  49. Erd F, Vignatti A and da Silva M Blocking the spread of misinformation in a network under distinct cost models Proceedings of the 12th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (232-236)
  50. Linhares C, Ponciano J, Paiva J, Rocha L and Travençolo B DyNetVis Proceedings of the 12th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (933-936)
  51. Woolcott G, Chamberlain D, Hawes Z, Drefs M, Bruce C, Davis B, Francis K, Hallowell D, McGarvey L, Moss J, Mulligan J, Okamoto Y, Sinclair N and Whiteley W (2020). The central position of education in knowledge mobilization: insights from network analyses of spatial reasoning research across disciplines, Scientometrics, 125:3, (2323-2347), Online publication date: 1-Dec-2020.
  52. ACM
    Drobyshevskiy M and Turdakov D (2019). Random Graph Modeling, ACM Computing Surveys, 52:6, (1-36), Online publication date: 30-Nov-2020.
  53. ACM
    Kiamari M, Ramachandran G, Nguyen Q, Pereira E, Holm J and Krishnamachari B COVID-19 Risk Estimation using a Time-varying SIR-model Proceedings of the 1st ACM SIGSPATIAL International Workshop on Modeling and Understanding the Spread of COVID-19, (36-42)
  54. Komar K, Santra A, Bhowmick S and Chakravarthy S EERMLN: EER Approach for Modeling, Mapping, and Analyzing Complex Data Using Multilayer Networks (MLNs) Conceptual Modeling, (555-572)
  55. Petrov T and Tognazzi S Centrality-Preserving Exact Reductions of Multi-Layer Networks Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles, (397-415)
  56. ACM
    Mathieu C and de Rougemont M Large Very Dense Subgraphs in a Stream of Edges Proceedings of the 2020 ACM-IMS on Foundations of Data Science Conference, (107-117)
  57. ACM
    Li S, Lee C and Eun D Trapping Malicious Crawlers in Social Networks Proceedings of the 29th ACM International Conference on Information & Knowledge Management, (775-784)
  58. ACM
    Liu Z, Lai D, Li C and Wang M Feature Fusion Based Subgraph Classification for Link Prediction Proceedings of the 29th ACM International Conference on Information & Knowledge Management, (985-994)
  59. Scheffler M and Brunzel J (2020). Destructive leadership in organizational research: a bibliometric approach, Scientometrics, 125:1, (755-775), Online publication date: 1-Oct-2020.
  60. Kamiński B, Prałat P and Théberge F A Scalable Unsupervised Framework for Comparing Graph Embeddings Algorithms and Models for the Web Graph, (52-67)
  61. ACM
    Fakorede O and Davies P Quantitative Measurable Concepts to Visualize Business Process Improvement Proceedings of the 3rd International Conference on Big Data Technologies, (147-154)
  62. Yeganeh P and Mostafavi M (2020). Causal Disturbance Analysis: A Novel Graph Centrality Based Method for Pathway Enrichment Analysis, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 17:5, (1613-1624), Online publication date: 1-Sep-2020.
  63. Cheng Q, Wang J, Lu W, Huang Y and Bu Y (2020). Keyword-citation-keyword network: a new perspective of discipline knowledge structure analysis, Scientometrics, 124:3, (1923-1943), Online publication date: 1-Sep-2020.
  64. Bloem P and de Rooij S (2020). Large-scale network motif analysis using compression, Data Mining and Knowledge Discovery, 34:5, (1421-1453), Online publication date: 1-Sep-2020.
  65. Shi X, Long W, Li Y, Deng D and Wei Y (2020). Research on the performance of multi-population genetic algorithms with different complex network structures, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:17, (13441-13459), Online publication date: 1-Sep-2020.
  66. Turowski K, Magner A and Szpankowski W (2020). Compression of Dynamic Graphs Generated by a Duplication Model, Algorithmica, 82:9, (2687-2707), Online publication date: 1-Sep-2020.
  67. ACM
    Zang C and Wang F Neural Dynamics on Complex Networks Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (892-902)
  68. ACM
    Jia J and Benson A Residual Correlation in Graph Neural Network Regression Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, (588-598)
  69. ACM
    Zügner D, Borchert O, Akbarnejad A and Günnemann S (2020). Adversarial Attacks on Graph Neural Networks, ACM Transactions on Knowledge Discovery from Data, 14:5, (1-31), Online publication date: 21-Aug-2020.
  70. Concas A, Noschese S, Reichel L and Rodriguez G (2020). A spectral method for bipartizing a network and detecting a large anti-community, Journal of Computational and Applied Mathematics, 373:C, Online publication date: 1-Aug-2020.
  71. Campanharo A, Doescher E and Ramos F (2018). Application of Quantile Graphs to the Automated Analysis of EEG Signals, Neural Processing Letters, 52:1, (5-20), Online publication date: 1-Aug-2020.
  72. Zhang X, Xue S and Zhu J A flexible latent space model for multilayer networks Proceedings of the 37th International Conference on Machine Learning, (11288-11297)
  73. Trivedi R, Yang J and Zha H GraphOpt Proceedings of the 37th International Conference on Machine Learning, (9603-9613)
  74. DasGupta B, Janardhanan M and Yahyanejad F (2020). Why Did the Shape of Your Network Change? (On Detecting Network Anomalies via Non-local Curvatures), Algorithmica, 82:7, (1741-1783), Online publication date: 1-Jul-2020.
  75. ACM
    Ahn Y and Lin Y (2020). PolicyFlow, ACM Transactions on Interactive Intelligent Systems, 10:2, (1-23), Online publication date: 26-Jun-2020.
  76. ACM
    Dumas C Electronic Petitioning as Online Collective Action: Exploring the Systematic and Strategic E-petitioning Behavior of an Extremist Group in We the People The 21st Annual International Conference on Digital Government Research, (7-15)
  77. Cerqueti R, Clemente G and Grassi R (2019). Influence measures in subnetworks using vertex centrality, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:12, (8569-8582), Online publication date: 1-Jun-2020.
  78. ACM
    Khamesi A, Silvestri S, Baker D and Paola A (2020). Perceived-Value-driven Optimization of Energy Consumption in Smart Homes, ACM Transactions on Internet of Things, 1:2, (1-26), Online publication date: 31-May-2020.
  79. Androutsopoulou E Urban intervention strategy for networking zografos public spaces Proceedings of the 11th Annual Symposium on Simulation for Architecture and Urban Design, (1-8)
  80. Bökler F, Chimani M, Wagner M and Wiedera T An Experimental Study of ILP Formulations for the Longest Induced Path Problem Combinatorial Optimization, (89-101)
  81. Baehr J, Bernardini A, Sigl G and Schlichtmann U (2020). Machine learning and structural characteristics for reverse engineering, Integration, the VLSI Journal, 72:C, (1-12), Online publication date: 1-May-2020.
  82. Sanz-Cruzado J, Macdonald C, Ounis I and Castells P Axiomatic Analysis of Contact Recommendation Methods in Social Networks: An IR Perspective Advances in Information Retrieval, (175-190)
  83. de Souza R, Figueiredo D, de A. Rocha A and Ziviani A (2020). Efficient network seeding under variable node cost and limited budget for social networks, Information Sciences: an International Journal, 514:C, (369-384), Online publication date: 1-Apr-2020.
  84. Lovato I, Pini A, Stamm A and Vantini S (2020). Model-free two-sample test for network-valued data, Computational Statistics & Data Analysis, 144:C, Online publication date: 1-Apr-2020.
  85. Serra P and Mandjes M (2020). Estimation of local degree distributions via local weighted averaging and Monte Carlo cross-validation, Computational Statistics & Data Analysis, 144:C, Online publication date: 1-Apr-2020.
  86. Valejo A, Góes F, Romanetto L, Ferreira de Oliveira M and de Andrade Lopes A (2019). A benchmarking tool for the generation of bipartite network models with overlapping communities, Knowledge and Information Systems, 62:4, (1641-1669), Online publication date: 1-Apr-2020.
  87. ACM
    Sano H and Berton L Topology and robustness analysis of temporal air transport network Proceedings of the 35th Annual ACM Symposium on Applied Computing, (1881-1884)
  88. ACM
    Hong S and Lu S Graph sampling methods for big complex networks integrating centrality, k-core, and spectral sparsification Proceedings of the 35th Annual ACM Symposium on Applied Computing, (1843-1851)
  89. Yang H, Luo J, Fan Y and Zhu L (2020). Using weighted k-means to identify Chinese leading venture capital firms incorporating with centrality measures, Information Processing and Management: an International Journal, 57:2, Online publication date: 1-Mar-2020.
  90. Linåker J, Regnell B and Damian D (2019). A method for analyzing stakeholders’ influence on an open source software ecosystem’s requirements engineering process, Requirements Engineering, 25:1, (115-130), Online publication date: 1-Mar-2020.
  91. ACM
    Ni L, Luo W, Zhu W and Hua B (2019). Local Overlapping Community Detection, ACM Transactions on Knowledge Discovery from Data, 14:1, (1-25), Online publication date: 29-Feb-2020.
  92. ACM
    Queiroz-Sousa P and Salgado A (2019). A Review on OLAP Technologies Applied to Information Networks, ACM Transactions on Knowledge Discovery from Data, 14:1, (1-25), Online publication date: 4-Feb-2020.
  93. Baldesi L, Maccari L and Lo Cigno R (2020). Infective flooding in low-duty-cycle networks, properties and bounds, Computer Communications, 151:C, (216-226), Online publication date: 1-Feb-2020.
  94. De la Cruz Cabrera O, Matar M and Reichel L (2019). Edge importance in a network via line graphs and the matrix exponential, Numerical Algorithms, 83:2, (807-832), Online publication date: 1-Feb-2020.
  95. ACM
    Silva T, Viana A, Benevenuto F, Villas L, Salles J, Loureiro A and Quercia D (2019). Urban Computing Leveraging Location-Based Social Network Data, ACM Computing Surveys, 52:1, (1-39), Online publication date: 31-Jan-2020.
  96. ACM
    Derr T, Ma Y, Fan W, Liu X, Aggarwal C and Tang J Epidemic Graph Convolutional Network Proceedings of the 13th International Conference on Web Search and Data Mining, (160-168)
  97. Dhilber M and Bhavani S Community Detection in Social Networks Using Deep Learning Distributed Computing and Internet Technology, (241-250)
  98. Klein B, Hoel E and Xu Y (2020). The Emergence of Informative Higher Scales in Complex Networks, Complexity, 2020, Online publication date: 1-Jan-2020.
  99. Chen X, Wang R, Yang D, Xian J, Li Q and Gan C (2020). Effects of the Awareness-Driven Individual Resource Allocation on the Epidemic Dynamics, Complexity, 2020, Online publication date: 1-Jan-2020.
  100. Jang G, Joo J, Park J and Geiger B (2020). Capturing the Signature of Topological Evolution from the Snapshots of Road Networks, Complexity, 2020, Online publication date: 1-Jan-2020.
  101. Wang L, Xue X, Zhou X and Wu G (2020). A New Approach for Measuring the Resilience of Transport Infrastructure Networks, Complexity, 2020, Online publication date: 1-Jan-2020.
  102. Wan X, Zhang Z, Zhang C, Meng Q and Xin B (2020). Stock Market Temporal Complex Networks Construction, Robustness Analysis, and Systematic Risk Identification, Complexity, 2020, Online publication date: 1-Jan-2020.
  103. Zhang Z, Du J, Meng Q, Rong X, Fan X and Wang L (2020). The Spread of Information in Virtual Communities, Complexity, 2020, Online publication date: 1-Jan-2020.
  104. Siudak D and Silva T (2020). The Influence of Interlocking Directorates on the Propensity of Dividend Payout to the Parent Company, Complexity, 2020, Online publication date: 1-Jan-2020.
  105. Mehler A, Gleim R, Gaitsch R, Hemati W, Uslu T and Beckage N (2020). From Topic Networks to Distributed Cognitive Maps, Complexity, 2020, Online publication date: 1-Jan-2020.
  106. Chen X, Liu Q, Wang R, Li Q, Wang W and Jalili M (2020). Self-Awareness-Based Resource Allocation Strategy for Containment of Epidemic Spreading, Complexity, 2020, Online publication date: 1-Jan-2020.
  107. Chen S, Duan C, Yang Y, Li D, Feng C and Tian D (2020). Deep Unsupervised Learning of 3D Point Clouds via Graph Topology Inference and Filtering, IEEE Transactions on Image Processing, 29, (3183-3198), Online publication date: 1-Jan-2020.
  108. Bhih A, Johnson P and Randles M (2019). An optimisation tool for robust community detection algorithms using content and topology information, The Journal of Supercomputing, 76:1, (226-254), Online publication date: 1-Jan-2020.
  109. Andrikopoulos A, Bekiaris M and Kostaris K (2019). Stars in a small world: social networks in auditing research, Scientometrics, 122:1, (625-643), Online publication date: 1-Jan-2020.
  110. Kim M, Paini D and Jurdak R (2018). Real-world diffusion dynamics based on point process approaches: a review, Artificial Intelligence Review, 53:1, (321-350), Online publication date: 1-Jan-2020.
  111. ACM
    Borassi M and Natale E (2019). KADABRA is an ADaptive Algorithm for Betweenness via Random Approximation, ACM Journal of Experimental Algorithmics, 24, (1-35), Online publication date: 17-Dec-2019.
  112. DeMuse R, Easlick T and Yin M (2019). Mixing time of vertex-weighted exponential random graphs, Journal of Computational and Applied Mathematics, 362:C, (443-459), Online publication date: 15-Dec-2019.
  113. Dehmamy N, Barabási A and Yu R Understanding the representation power of graph neural networks in learning graph topology Proceedings of the 33rd International Conference on Neural Information Processing Systems, (15413-15423)
  114. Ma J, Tang W, Zhu J and Mei Q A flexible generative framework for graph-based semi-supervised learning Proceedings of the 33rd International Conference on Neural Information Processing Systems, (3281-3290)
  115. Shahmoradi M, Ebrahimi M, Heshmati Z and Salehi M (2019). Multilayer overlapping community detection using multi-objective optimization, Future Generation Computer Systems, 101:C, (221-235), Online publication date: 1-Dec-2019.
  116. Choi E and Horvát E Airbnb’s Reputation System and Gender Differences Among Guests: Evidence from Large-Scale Data Analysis and a Controlled Experiment Social Informatics, (3-17)
  117. Cai S, Chen X, Ye X and Tang M (2019). Precisely identifying the epidemic thresholds in real networks via asynchronous updating, Applied Mathematics and Computation, 361:C, (377-388), Online publication date: 15-Nov-2019.
  118. Feng S and Jin Z (2019). Infectious diseases spreading on a metapopulation network coupled with its second-neighbor network, Applied Mathematics and Computation, 361:C, (87-97), Online publication date: 15-Nov-2019.
  119. ACM
    Roitero K, Brunello A, Urbano J and Mizzaro S Towards Stochastic Simulations of Relevance Profiles Proceedings of the 28th ACM International Conference on Information and Knowledge Management, (2217-2220)
  120. Lai M, Tambuscio M, Patti V, Ruffo G and Rosso P (2019). Stance polarity in political debates, Data & Knowledge Engineering, 124:C, Online publication date: 1-Nov-2019.
  121. Maccari L, Gemmi G, Lo Cigno R, Karaliopoulos M and Navarro L (2019). Towards scalable Community Networks topologies, Ad Hoc Networks, 94:C, Online publication date: 1-Nov-2019.
  122. ACM
    De Meo P, Levene M and Provetti A Potential gain as a centrality measure IEEE/WIC/ACM International Conference on Web Intelligence, (418-422)
  123. ACM
    Cho J, Rager S, O’Donovan J, Adali S and Horne B (2019). Uncertainty-based False Information Propagation in Social Networks, ACM Transactions on Social Computing, 2:2, (1-34), Online publication date: 3-Oct-2019.
  124. Barceló-Coblijn L, Irurtzun A, Real Puigdollers C, López-Navarro E and Gomila A (2020). How children develop their ability to combine words, Adaptive Behavior - Animals, Animats, Software Agents, Robots, Adaptive Systems, 27:5, (307-330), Online publication date: 1-Oct-2019.
  125. Baldesi L, Markopoulou A and Buttsc C (2019). Spectral Graph Forge, IEEE/ACM Transactions on Networking, 27:5, (2125-2136), Online publication date: 1-Oct-2019.
  126. Bioglio L, Capecchi S, Peiretti F, Sayed D, Torasso A and Pensa R (2019). A Social Network Simulation Game to Raise Awareness of Privacy Among School Children, IEEE Transactions on Learning Technologies, 12:4, (456-469), Online publication date: 1-Oct-2019.
  127. Ghanooni N, Haifani F and Kleinbauer M (2019). The graph spectra and spectral moments of random graphs, Discrete Applied Mathematics, 269:C, (32-40), Online publication date: 30-Sep-2019.
  128. ACM
    Addas A, Thorpe J and Salehi-Abari A Towards models for quantifying the known adversary Proceedings of the New Security Paradigms Workshop, (103-117)
  129. Ribas L, Gonçalves W and Bruno O (2019). Dynamic texture analysis with diffusion in networks, Digital Signal Processing, 92:C, (109-126), Online publication date: 1-Sep-2019.
  130. Skibski O, Rahwan T, Michalak T and Yokoo M (2019). Attachment centrality, Artificial Intelligence, 274:C, (151-179), Online publication date: 1-Sep-2019.
  131. ACM
    Avin C, Lotker Z, Nahum Y and Peleg D Random preferential attachment hypergraph Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (398-405)
  132. Sadria M, Karimi S and Layton A (2019). Network centrality analysis of eye-gaze data in autism spectrum disorder, Computers in Biology and Medicine, 111:C, Online publication date: 1-Aug-2019.
  133. De la Cruz Cabrera O, Matar M and Reichel L (2019). Analysis of directed networks via the matrix exponential, Journal of Computational and Applied Mathematics, 355:C, (182-192), Online publication date: 1-Aug-2019.
  134. Bhih A, Johnson P and Randles M (2019). Decentralized iterative approaches for community clustering in the networks, The Journal of Supercomputing, 75:8, (4894-4917), Online publication date: 1-Aug-2019.
  135. Nayak G, Dutta S, Ajwani D, Nicholson P and Sala A (2019). Automated assessment of knowledge hierarchy evolution: comparing directed acyclic graphs, Information Retrieval, 22:3-4, (256-284), Online publication date: 1-Aug-2019.
  136. Faghani M and Nguyen U (2019). Mobile botnets meet social networks, International Journal of Information Security, 18:4, (423-449), Online publication date: 1-Aug-2019.
  137. Zhang H, Wang C, Lai J and Yu P (2019). Community detection using multilayer edge mixture model, Knowledge and Information Systems, 60:2, (757-779), Online publication date: 1-Aug-2019.
  138. ACM
    Pulver M and Suthers D Mālama Honua Worldwide Voyage Proceedings of the 10th International Conference on Social Media and Society, (148-157)
  139. ACM
    Cornelissen L, Schoonwinkel P and Barnett R A Socio-Informatic Approach to Automated Account Classification on Social Media Proceedings of the 10th International Conference on Social Media and Society, (24-32)
  140. ACM
    Pope A, Tauritz D and Rawlings C Automated design of random dynamic graph models Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1504-1512)
  141. ACM
    Adair J, Ochoa G and Malan K Local optima networks for continuous fitness landscapes Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1407-1414)
  142. ACM
    Lee C, Tenneti S and Eun D Transient Dynamics of Epidemic Spreading and Its Mitigation on Large Networks Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, (191-200)
  143. Das A, Sexton D, Lainscsek C, Cash S and Sejnowski T (2019). Characterizing brain connectivity from human electrocorticography recordings with unobserved inputs during epileptic seizures, Neural Computation, 31:7, (1271-1326), Online publication date: 1-Jul-2019.
  144. Tosyali A, Kim J, Choi J and Jeong M (2019). Regularized asymmetric nonnegative matrix factorization for clustering in directed networks, Pattern Recognition Letters, 125:C, (750-757), Online publication date: 1-Jul-2019.
  145. Zhang S, Medo M, Lü L and Mariani M (2019). The long-term impact of ranking algorithms in growing networks, Information Sciences: an International Journal, 488:C, (257-271), Online publication date: 1-Jul-2019.
  146. Cozman F and Mauá D (2019). The finite model theory of Bayesian network specifications, International Journal of Approximate Reasoning, 110:C, (107-126), Online publication date: 1-Jul-2019.
  147. Mourchid Y, Hassouni M and Cherifi H (2019). A general framework for complex network-based image segmentation, Multimedia Tools and Applications, 78:14, (20191-20216), Online publication date: 1-Jul-2019.
  148. Zloch M, Acosta M, Hienert D, Dietze S and Conrad S A Software Framework and Datasets for the Analysis of Graph Measures on RDF Graphs The Semantic Web, (523-539)
  149. Bentert M and Nichterlein A Parameterized Complexity of Diameter Algorithms and Complexity, (50-61)
  150. ACM
    Wang J, Kong X, Xia F and Sun L (2019). Urban Human Mobility, ACM SIGKDD Explorations Newsletter, 21:1, (1-19), Online publication date: 13-May-2019.
  151. ACM
    Shah H, Kuma S and Sundaram H Growing Attributed Networks through Local Processes The World Wide Web Conference, (3208-3214)
  152. ACM
    Li H, Peng R, Shan L, Yi Y and Zhang Z Current Flow Group Closeness Centrality for Complex Networks? The World Wide Web Conference, (961-971)
  153. Bredereck R, Elkind E and Igarashi A Hedonic Diversity Games Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, (565-573)
  154. F. de Arruda H, Q. Marinho V, da F. Costa L and R. Amancio D (2022). Paragraph-based representation of texts, Information Processing and Management: an International Journal, 56:3, (479-494), Online publication date: 1-May-2019.
  155. Ito H, Yamamoto T and Morita S (2019). Demography of sexually transmitted infections with vertical transmission, Applied Mathematics and Computation, 348:C, (363-370), Online publication date: 1-May-2019.
  156. ACM
    Vega-Oliveros D, Cotacallapa M, Ferreira L, Quiles M, Zhao L, Macau E and Cardoso M From spatio-temporal data to chronological networks Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (675-682)
  157. Veremyev A, Prokopyev O and Pasiliao E (2019). Finding Critical Links for Closeness Centrality, INFORMS Journal on Computing, 31:2, (367-389), Online publication date: 1-Apr-2019.
  158. ACM
    Lee C, Kang M and Eun D (2019). Non-Markovian Monte Carlo on Directed Graphs, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 3:1, (1-31), Online publication date: 26-Mar-2019.
  159. List J (2019). Automatic inference of sound correspondence patterns across multiple languages, Computational Linguistics, 45:1, (137-161), Online publication date: 1-Mar-2019.
  160. Berkhout J and Heidergott B (2019). The Jump Start Power Method, Journal of Scientific Computing, 78:3, (1691-1723), Online publication date: 1-Mar-2019.
  161. Hasan M, Raja A and Bazzan A (2019). A context-aware convention formation framework for large-scale networks, Autonomous Agents and Multi-Agent Systems, 33:1-2, (1-34), Online publication date: 1-Mar-2019.
  162. ACM
    Romero D, Uzzi B and Kleinberg J (2019). Social Networks under Stress, ACM Transactions on the Web, 13:1, (1-24), Online publication date: 28-Feb-2019.
  163. Okubo M, Hanaka T and Ono H Optimal Partition of a Tree with Social Distance WALCOM: Algorithms and Computation, (121-132)
  164. ACM
    Gao X, Zheng Q, Verri F, Rodrigues R and Zhao L Particle Competition for Multilayer Network Community Detection Proceedings of the 2019 11th International Conference on Machine Learning and Computing, (75-80)
  165. Orlov Y, Chakrabarty S, Zhao D and Spurgeon S (2018). Sliding Mode Observer Design for a Parabolic PDE in the Presence of Unknown Inputs, Asian Journal of Control, 21:1, (224-235), Online publication date: 21-Feb-2019.
  166. Singh C and Jolad S (2019). Structure and evolution of Indian physics co-authorship networks, Scientometrics, 118:2, (385-406), Online publication date: 1-Feb-2019.
  167. Michele R, Ferretti S and Furini M (2019). On helping broadcasters to promote TV-shows through hashtags, Multimedia Tools and Applications, 78:3, (3279-3296), Online publication date: 1-Feb-2019.
  168. ACM
    Jia J and Benson A Random Spatial Network Models for Core-Periphery Structure Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, (366-374)
  169. D'Angelo G, Olsen M and Severini L Coverage centrality maximization in undirected networks Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence and Thirty-First Innovative Applications of Artificial Intelligence Conference and Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, (501-508)
  170. Wąs T, Rahwan T and Skibski O Random walk decay centrality Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence and Thirty-First Innovative Applications of Artificial Intelligence Conference and Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, (2197-2204)
  171. Jin D, You X, Li W, He D, Cui P, Fogelman-Soulié F and Chakraborty T Incorporating network embedding into Markov random field for better community detection Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence and Thirty-First Innovative Applications of Artificial Intelligence Conference and Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, (160-167)
  172. ACM
    Baehr J, Bernardini A, Sigl G and Schlichtmann U Machine learning and structural characteristics for reverse engineering Proceedings of the 24th Asia and South Pacific Design Automation Conference, (96-103)
  173. Smith K, Spyrou L and Escudero J (2018). Graph-Variate Signal Analysis, IEEE Transactions on Signal Processing, 67:2, (293-305), Online publication date: 15-Jan-2019.
  174. (2019). Discovering communities for web usage mining systems, International Journal of Advanced Intelligence Paradigms, 12:3-4, (331-354), Online publication date: 1-Jan-2019.
  175. Letina S, Blanken T, Deserno M, Borsboom D and Beckage N (2019). Expanding Network Analysis Tools in Psychological Networks, Complexity, 2019, Online publication date: 1-Jan-2019.
  176. Marle F, Jaber H, Pointurier C and Botev J (2019). Organizing Project Actors for Collective Decision-Making about Interdependent Risks, Complexity, 2019, Online publication date: 1-Jan-2019.
  177. Neergaard K, Huang C and Siew C (2019). Constructing the Mandarin Phonological Network, Complexity, 2019, Online publication date: 1-Jan-2019.
  178. Wang N, Jin Z, Peng X and Gómez S (2019). Community Detection with Self-Adapting Switching Based on Affinity, Complexity, 2019, Online publication date: 1-Jan-2019.
  179. Meghanathan N and Meštrović A (2019). Unit Disk Graph-Based Node Similarity Index for Complex Network Analysis, Complexity, 2019, Online publication date: 1-Jan-2019.
  180. Yin M, Chen X, Wang Q, Wang W, Wang Y and Zhang K (2019). Dynamics on Hybrid Complex Network, Security and Communication Networks, 2019, Online publication date: 1-Jan-2019.
  181. Bertotti M, Modanese G and Correia M (2019). The Bass Diffusion Model on Finite Barabasi-Albert Networks, Complexity, 2019, Online publication date: 1-Jan-2019.
  182. Xiong L, Wang G, Liu H and Tramontana E (2019). New Community Estimation Method in Bipartite Networks Based on Quality of Filtering Coefficient, Scientific Programming, 2019, Online publication date: 1-Jan-2019.
  183. Cai Q, Pratama M, Alam S and Amancio D (2019). Interdependency and Vulnerability of Multipartite Networks under Target Node Attacks, Complexity, 2019, Online publication date: 1-Jan-2019.
  184. Martínez V, Berzal F, Cubero J and Cimini G (2019). NOESIS, Complexity, 2019, Online publication date: 1-Jan-2019.
  185. Sánchez-Rebollo C, Puente C, Palacios R, Piriz C, Fuentes J, Jarauta J and Krzemień A (2019). Detection of Jihadism in Social Networks Using Big Data Techniques Supported by Graphs and Fuzzy Clustering, Complexity, 2019, Online publication date: 1-Jan-2019.
  186. Abou Kasm O, Mohandes B, Diabat A and El Khatib S (2019). Exam timetabling with allowable conflicts within a time window, Computers and Industrial Engineering, 127:C, (263-273), Online publication date: 1-Jan-2019.
  187. ACM
    Marik R Feature Space Decomposition using Information Theory Proceedings of the 2018 International Conference on Algorithms, Computing and Artificial Intelligence, (1-10)
  188. Chakravarthy S, Santra A and Komar K Humble Data Management to Big Data Analytics/Science: A Retrospective Stroll Big Data Analytics, (33-54)
  189. Kumar K and Efstathopoulos P (2018). Utility-driven graph summarization, Proceedings of the VLDB Endowment, 12:4, (335-347), Online publication date: 1-Dec-2018.
  190. Yang S and Liu J (2018). Time-Series Forecasting Based on High-Order Fuzzy Cognitive Maps and Wavelet Transform, IEEE Transactions on Fuzzy Systems, 26:6, (3391-3402), Online publication date: 1-Dec-2018.
  191. Schlaile M, Knausberg T, Mueller M and Zeman J (2022). Viral ice buckets, Cognitive Systems Research, 52:C, (947-969), Online publication date: 1-Dec-2018.
  192. Teixeira E and Oliveira M (2018). Editorial board interlocking in knowledge management and intellectual capital research field, Scientometrics, 117:3, (1853-1869), Online publication date: 1-Dec-2018.
  193. Colavizza G (2018). A diachronic study of historiography, Scientometrics, 117:3, (2117-2131), Online publication date: 1-Dec-2018.
  194. ACM
    Hamann M, Meyer U, Penschuck M, Tran H and Wagner D (2018). I/O-Efficient Generation of Massive Graphs Following the LFR Benchmark, ACM Journal of Experimental Algorithmics, 23, (1-33), Online publication date: 15-Nov-2018.
  195. ACM
    Looz M and Meyerhenke H (2018). Updating Dynamic Random Hyperbolic Graphs in Sublinear Time, ACM Journal of Experimental Algorithmics, 23, (1-30), Online publication date: 15-Nov-2018.
  196. Gadat S, Gavra I and Risser L (2018). How to Calculate the Barycenter of a Weighted Graph, Mathematics of Operations Research, 43:4, (1085-1118), Online publication date: 1-Nov-2018.
  197. De Paulo A, Ribeiro E and Porto G (2018). Mapping countries cooperation networks in photovoltaic technology development based on patent analysis, Scientometrics, 117:2, (667-686), Online publication date: 1-Nov-2018.
  198. Xu R and Ghaffarzadegan N (2018). Neuroscience bridging scientific disciplines in health, Scientometrics, 117:2, (1183-1204), Online publication date: 1-Nov-2018.
  199. ACM
    Riondato M and Upfal E (2018). ABRA, ACM Transactions on Knowledge Discovery from Data, 12:5, (1-38), Online publication date: 31-Oct-2018.
  200. Ding C and Li K (2018). Centrality ranking in multiplex networks using topologically biased random walks, Neurocomputing, 312:C, (263-275), Online publication date: 27-Oct-2018.
  201. ACM
    Hanafi H, Rafii F, Hassani B and Kbir M A graph based model for multiple biological data sources integration Proceedings of the 3rd International Conference on Smart City Applications, (1-5)
  202. La Q, Quek T and Shin H (2018). Dynamic Network Formation Game With Social Awareness in D2D Communications, IEEE Transactions on Wireless Communications, 17:10, (6544-6558), Online publication date: 1-Oct-2018.
  203. ACM
    Duricic T, Lacic E, Kowald D and Lex E Trust-based collaborative filtering Proceedings of the 12th ACM Conference on Recommender Systems, (446-450)
  204. ACM
    Sanz-Cruzado J and Castells P Enhancing structural diversity in social networks by recommending weak ties Proceedings of the 12th ACM Conference on Recommender Systems, (233-241)
  205. ACM
    Cornelissen L, Barnett R, Schoonwinkel P, Eichstadt B and Magodla H A network topology approach to bot classification Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, (79-88)
  206. Li W, Chai L, Yang C and Wang X An Evolutionary Analysis of DBpedia Datasets Web Information Systems and Applications, (317-329)
  207. Zhao X, Chen H, Liu X, Tan X and Song W Block Modelling and Learning for Structure Analysis of Networks with Positive and Negative Links Knowledge Science, Engineering and Management, (396-402)
  208. ACM
    Kucher K, Martins R and Kerren A Analysis of VINCI 2009-2017 Proceedings Proceedings of the 11th International Symposium on Visual Information Communication and Interaction, (97-101)
  209. Achlioptas D and Siminelakis P (2018). Symmetric graph properties have independent edges, Information and Computation, 261:P2, (446-463), Online publication date: 1-Aug-2018.
  210. Abdelzaher A, Ghosh P, Al Musawi A and Wang J Application of Social Network Analytics to Assessing Different Care Coordination Metrics Social Computing and Social Media. Technologies and Analytics, (151-160)
  211. Gao L, Yang H, Zhou C, Wu J, Pan S and Hu Y Active discriminative network representation learning Proceedings of the 27th International Joint Conference on Artificial Intelligence, (2142-2148)
  212. Wąs T and Skibski O Axiomatization of the pagerank centrality Proceedings of the 27th International Joint Conference on Artificial Intelligence, (3898-3904)
  213. Shan L, Yi Y and Zhang Z Improving information centrality of a node in complex networks by adding edges Proceedings of the 27th International Joint Conference on Artificial Intelligence, (3535-3541)
  214. ACM
    Mehler A, Abrami G, Spiekermann C and Jostock M VAnnotatoR Proceedings of the 29th on Hypertext and Social Media, (150-154)
  215. ACM
    Nickerson K, Chen Y, Wang F and Hu T Measuring evolvability and accessibility using the hyperlink-induced topic search algorithm Proceedings of the Genetic and Evolutionary Computation Conference, (1175-1182)
  216. Ferretti S (2018). On the complex network structure of musical pieces, Multimedia Tools and Applications, 77:13, (16003-16029), Online publication date: 1-Jul-2018.
  217. ACM
    Savić M Analysis of Annotated Social and Information Networks Proceedings of the 8th International Conference on Web Intelligence, Mining and Semantics, (1-4)
  218. ACM
    Sideris G, Katsaros D, Sidiropoulos A and Manolopoulos Y The Science of Science and a Multilayer Network Approach to Scientists' Ranking Proceedings of the 22nd International Database Engineering & Applications Symposium, (5-11)
  219. Liu X and Kim K A Comparative Study of Network Embedding Based on Matrix Factorization Data Mining and Big Data, (89-101)
  220. Wandelt S, Sun X, Zanin M and Havlin S (2018). QRE, Future Generation Computer Systems, 83:C, (413-424), Online publication date: 1-Jun-2018.
  221. Paulius D, Jelodar A and Sun Y Functional Object-Oriented Network: Construction & Expansion 2018 IEEE International Conference on Robotics and Automation (ICRA), (1-7)
  222. ACM
    Quraishi M, Fafalios P and Herder E Viewpoint Discovery and Understanding in Social Networks Proceedings of the 10th ACM Conference on Web Science, (47-56)
  223. ACM
    Dumba B and Zhang Z Uncovering the Nucleus of Social Networks Proceedings of the 10th ACM Conference on Web Science, (37-46)
  224. Spitz A, Strötgen J and Gertz M Predicting Document Creation Times in News Citation Networks Companion Proceedings of the The Web Conference 2018, (1731-1736)
  225. Gray C, Mitchell L and Roughan M Super-blockers and the Effect of Network Structure on Information Cascades Companion Proceedings of the The Web Conference 2018, (1435-1441)
  226. Sanz-Cruzado J, Pepa S and Castells P Structural Novelty and Diversity in Link Prediction Companion Proceedings of the The Web Conference 2018, (1347-1351)
  227. Kumar M, Singh A and Cherifi H An Efficient Immunization Strategy Using Overlapping Nodes and Its Neighborhoods Companion Proceedings of the The Web Conference 2018, (1269-1275)
  228. Lu J, Wang H and Li D Uniform Random Sampling Not Recommended Companion Proceedings of the The Web Conference 2018, (495-499)
  229. Cetto A, Klier M, Richter A and Zolitschka J (2018). “Thanks for sharing”—Identifying users’ roles based on knowledge contribution in Enterprise Social Networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 135:C, (275-288), Online publication date: 22-Apr-2018.
  230. Ceci E and Barbarossa S Small Perturbation Analysis of Network Topologies 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4194-4198)
  231. Lin K, Qi Y, Feng S, Liani Q, Pan G and Wang Y Epileptic State Segmentation with Temporal-Constrained Clustering 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (881-885)
  232. Hashemi A, Shafipour R, Vikalo H and Mateos G Sampling and Reconstruction of Graph Signals via Weak Submodularity and Semidefinite Relaxation 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4179-4183)
  233. Teke O and Vaidyanathan P The Asynchronous Power Iteration: A Graph Signal Perspective 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4059-4063)
  234. Liu S, Chent P, Rajapakse I and Hero A FIRST-ORDER BIFURCATION DETECTION FOR DYNAMIC COMPLEX NETWORKS 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (6912-6916)
  235. Huang W, Bolton T, Medaglia J, Bassett D, Ribeiro A and Van De Ville D Graph Signal Processing of Human Brain Imaging Data 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (980-984)
  236. Avin C, Cohen A, Fraigniaud P, Lotker Z and Peleg D Preferential Attachment as a Unique Equilibrium Proceedings of the 2018 World Wide Web Conference, (559-568)
  237. Abitbol J, Karsai M, Magué J, Chevrot J and Fleury E Socioeconomic Dependencies of Linguistic Patterns in Twitter Proceedings of the 2018 World Wide Web Conference, (1125-1134)
  238. ACM
    Coimbra M, Selimi M, Francisco A, Freitag F and Veiga L Gelly-scheduling Proceedings of the 33rd Annual ACM Symposium on Applied Computing, (151-160)
  239. Huang Y and Ren S (2018). Passivity and Passivity-Based Synchronization of Switched Coupled Reaction-Diffusion Neural Networks with State and Spatial Diffusion Couplings, Neural Processing Letters, 47:2, (347-363), Online publication date: 1-Apr-2018.
  240. ACM
    Gudmundsson J and Horton M (2017). Spatio-Temporal Analysis of Team Sports, ACM Computing Surveys, 50:2, (1-34), Online publication date: 31-Mar-2018.
  241. Ji K, Chen Z, Sun R, Ma K, Yuan Z and Xu G (2018). GIST, Expert Systems with Applications: An International Journal, 94:C, (81-93), Online publication date: 15-Mar-2018.
  242. ACM
    Perozzi B and Akoglu L (2018). Discovering Communities and Anomalies in Attributed Graphs, ACM Transactions on Knowledge Discovery from Data, 12:2, (1-40), Online publication date: 13-Mar-2018.
  243. Hu X, Shi P, Wang M and Leeson M (2018). Adaptive behaviors can improve the system consilience of a network system, Adaptive Behavior - Animals, Animats, Software Agents, Robots, Adaptive Systems, 26:1, (3-19), Online publication date: 1-Feb-2018.
  244. Maier D, Waldherr A, Miltner P, Jähnichen P and Pfetsch B (2018). Exploring Issues in a Networked Public Sphere, Social Science Computer Review, 36:1, (3-20), Online publication date: 1-Feb-2018.
  245. Cupertino T, Guimares Carneiro M, Zheng Q, Zhang J and Zhao L (2018). A scheme for high level data classification using random walk and network measures, Expert Systems with Applications: An International Journal, 92:C, (289-303), Online publication date: 1-Feb-2018.
  246. Li H and Zhang Z Kirchhoff index as a measure of edge centrality in weighted networks Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (2377-2396)
  247. Meng Q, Zhang Z, Wan X, Rong X and Shi Y (2018). Properties Exploring and Information Mining in Consumer Community Network, Complexity, 2018, Online publication date: 1-Jan-2018.
  248. Wang F, Zhang B, Chai S, Xia Y and Kamal S (2018). An Extreme Learning Machine-Based Community Detection Algorithm in Complex Networks, Complexity, 2018, Online publication date: 1-Jan-2018.
  249. Zare-Garizy T, Fridgen G, Wederhake L and Del Rey A (2018). A Privacy Preserving Approach to Collaborative Systemic Risk Identification, Security and Communication Networks, 2018, Online publication date: 1-Jan-2018.
  250. Serafini P and Riguzzi F (2018). An Iterative Scheme to Compute Size Probabilities in Random Graphs and Branching Processes, Scientific Programming, 2018, Online publication date: 1-Jan-2018.
  251. Riaza R and Gómez S (2018). Twin Subgraphs and Core-Semiperiphery-Periphery Structures, Complexity, 2018, Online publication date: 1-Jan-2018.
  252. Xu X, Yang M, Li G and Migliore M (2018). Constructing Temporally Extended Actions through Incremental Community Detection, Computational Intelligence and Neuroscience, 2018, Online publication date: 1-Jan-2018.
  253. Rosell-Tarragó G, Cozzo E, Díaz-Guilera A and Sayama H (2018). A Complex Network Framework to Model Cognition, Complexity, 2018, Online publication date: 1-Jan-2018.
  254. Valenzuela J, Fu X, Xiao G, Goh R and De Lellis P (2018). A Network-Based Impact Measure for Propagated Losses in a Supply Chain Network Consisting of Resilient Components, Complexity, 2018, Online publication date: 1-Jan-2018.
  255. Gadar L, Kosztyan Z, Abonyi J and De Meo P (2018). The Settlement Structure Is Reflected in Personal Investments, Complexity, 2018, Online publication date: 1-Jan-2018.
  256. Bateni M, Behnezhad S, Derakhshan M, Hajiaghayi M, Kiveris R, Lattanzi S and Mirrokni V Affinity clustering Proceedings of the 31st International Conference on Neural Information Processing Systems, (6867-6877)
  257. Schneckenreither G and Popper N Dynamic multiplex social network models on multiple time scales for simulating contact formation and patterns in epidemic spread Proceedings of the 2017 Winter Simulation Conference, (1-12)
  258. Chan W Agent-based and regression models of social influence Proceedings of the 2017 Winter Simulation Conference, (1-12)
  259. Lu J and Wang H (2017). Uniform random sampling not recommended for large graph size estimation, Information Sciences: an International Journal, 421:C, (136-153), Online publication date: 1-Dec-2017.
  260. ACM
    Onoue Y and Koyamada K Optimal tree reordering for group-in-a-box graph layouts SIGGRAPH Asia 2017 Symposium on Visualization, (1-9)
  261. Alrajebah N, Tiropanis T and Carr L Cascades on Online Social Networks: A Chronological Account Internet Science, (393-411)
  262. ACM
    Fender A, Emad N, Petiton S, Eaton J and Naumov M Parallel jaccard and related graph clustering techniques Proceedings of the 8th Workshop on Latest Advances in Scalable Algorithms for Large-Scale Systems, (1-8)
  263. ACM
    Jin S and Zafarani R Emotions in Social Networks Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, (1907-1916)
  264. Óskarsdóttir M, Bravo C, Verbeke W, Sarraute C, Baesens B and Vanthienen J (2017). Social network analytics for churn prediction in telco, Expert Systems with Applications: An International Journal, 85:C, (204-220), Online publication date: 1-Nov-2017.
  265. Will M, Bttner K, Kaufholz T, Mller-Graf C, Selhorst T and Krieter J (2017). Accuracy of a real-time location system in static positions under practical conditions, Computers and Electronics in Agriculture, 142:PA, (473-484), Online publication date: 1-Nov-2017.
  266. Anderson J and Cho J Software Defined Network Based Virtual Machine Placement in Cloud Systems MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM), (876-881)
  267. Teke O and Vaidyanathan P (2017). Uncertainty Principles and Sparse Eigenvectors of Graphs, IEEE Transactions on Signal Processing, 65:20, (5406-5420), Online publication date: 15-Oct-2017.
  268. Yan B, Chen Y and Liu J Dynamic Relationship Building: Exploitation Versus Exploration on a Social Network Web Information Systems Engineering – WISE 2017, (75-90)
  269. Dimirovski G, Wang R and Yang B Delay and recurrent neural networks: Computational cybernetics of systems biology? 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), (906-911)
  270. Jones N, Paschos G, Shrader B, Modiano E, Jones N, Paschos G, Shrader B and Modiano E (2017). An Overlay Architecture for Throughput Optimal Multipath Routing, IEEE/ACM Transactions on Networking, 25:5, (2615-2628), Online publication date: 1-Oct-2017.
  271. Pandey P and Adhikari B (2017). A Parametric Model Approach for Structural Reconstruction of Scale-Free Networks, IEEE Transactions on Knowledge and Data Engineering, 29:10, (2072-2085), Online publication date: 1-Oct-2017.
  272. Shao Y, Lei K, Chen L, Huang Z, Cui B, Liu Z, Tong Y and Xu J (2017). Fast Parallel Path Concatenation for Graph Extraction, IEEE Transactions on Knowledge and Data Engineering, 29:10, (2210-2222), Online publication date: 1-Oct-2017.
  273. ACM
    Luptáková I, Šimon M and Pospíchal J Worst-case test network optimization for community detection method Proceedings of the 8th Balkan Conference in Informatics, (1-6)
  274. ACM
    Naderi Yeganeh P and Mostafavi M Use of Structural Properties of Underlying Graphs in Pathway Enrichment Analysis of Genomic Data Proceedings of the 8th ACM International Conference on Bioinformatics, Computational Biology,and Health Informatics, (279-284)
  275. De Deyne S, Perfors A and Navarro D Predicting human similarity judgments with distributional models Proceedings of the 26th International Joint Conference on Artificial Intelligence, (4806-4810)
  276. Isufi E, Loukas A, Simonetto A and Leus G (2017). Filtering Random Graph Processes Over Random Time-Varying Graphs, IEEE Transactions on Signal Processing, 65:16, (4406-4421), Online publication date: 15-Aug-2017.
  277. ACM
    Avin C, Lotker Z, Nahum Y and Peleg D Improved Degree Bounds and Full Spectrum Power Laws in Preferential Attachment Networks Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (45-53)
  278. Khadangi E and Bagheri A (2017). Presenting novel application-based centrality measures for finding important users based on their activities and social behavior, Computers in Human Behavior, 73:C, (64-79), Online publication date: 1-Aug-2017.
  279. ACM
    Gera R, Juliano N and Schmitt K Optimizing Network Discovery with Clever Walks Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, (1217-1224)
  280. ACM
    Cassavia N, Masciari E, Pulice C and Saccà D (2017). Discovering User Behavioral Features to Enhance Information Search on Big Data, ACM Transactions on Interactive Intelligent Systems, 7:2, (1-33), Online publication date: 29-Jul-2017.
  281. ACM
    Hamilton K, Imam N and Humble T Community detection with spiking neural networks for neuromorphic hardware Proceedings of the Neuromorphic Computing Symposium, (1-8)
  282. Fierimonte R, Altilio R and Panella M Distributed on-line learning for random-weight fuzzy neural networks 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (1-6)
  283. Mao W, Cai Z, Towsley D, Feng Q and Guan X (2017). Security importance assessment for system objects and malware detection, Computers and Security, 68:C, (47-68), Online publication date: 1-Jul-2017.
  284. Jesenko D, Mernik M, alik B and Mongus D (2017). Two-level evolutionary algorithm for discovering relations between nodes features in a complex network, Applied Soft Computing, 56:C, (82-93), Online publication date: 1-Jul-2017.
  285. Wang S and Liu J Enhancing the robustness of complex networks against edge-based-attack cascading failures 2017 IEEE Congress on Evolutionary Computation (CEC), (23-28)
  286. Wang S and Liu J A multi-agent genetic algorithm for improving the robustness of communities in complex networks against attacks 2017 IEEE Congress on Evolutionary Computation (CEC), (17-22)
  287. de la Hoz E, Marsa-Maestre I, Gimenez-Guzman J, Orden D and Klein M Multi-Agent Nonlinear Negotiation for Wi-Fi Channel Assignment Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, (1035-1043)
  288. Kalmbach P, Blenk A, Kluegel M and Kellerer W Generating synthetic Internet- and IP-topologies using the Stochastic-Block-Model 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), (911-916)
  289. Chen S, Yang Y, Zong S, Singh A and Kovacevic J (2017). Detecting Localized Categorical Attributes on Graphs, IEEE Transactions on Signal Processing, 65:10, (2725-2740), Online publication date: 1-May-2017.
  290. Meng Y, Jiang C, Chen H and Ren Y (2017). Cooperative Device-to-Device Communications: Social Networking Perspectives, IEEE Network: The Magazine of Global Internetworking, 31:3, (38-44), Online publication date: 1-May-2017.
  291. Samani Z and Moghaddam M (2017). A knowledge-based semantic approach for image collection summarization, Multimedia Tools and Applications, 76:9, (11917-11939), Online publication date: 1-May-2017.
  292. Koncar P, Walk S, Helic D and Strohmaier M Exploring the Impact of Trolls on Activity Dynamics in Real-World Collaboration Networks Proceedings of the 26th International Conference on World Wide Web Companion, (1573-1578)
  293. Chen W and Teng S Interplay between Social Influence and Network Centrality Proceedings of the 26th International Conference on World Wide Web, (967-976)
  294. ACM
    Pereira T, Neto M and Victorino G Information and Knowledge-Intensive Firm Proceedings of the 2017 International Conference on Information System and Data Mining, (44-50)
  295. Mei J and Moura J (2017). Signal Processing on Graphs, IEEE Transactions on Signal Processing, 65:8, (2077-2092), Online publication date: 1-Apr-2017.
  296. Mahmood A, Small M, Al-Maadeed S and Rajpoot N (2017). Using Geodesic Space Density Gradients for Network Community Detection, IEEE Transactions on Knowledge and Data Engineering, 29:4, (921-935), Online publication date: 1-Apr-2017.
  297. Ji S, Mittal P and Beyah R (2017). Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey, IEEE Communications Surveys & Tutorials, 19:2, (1305-1326), Online publication date: 1-Apr-2017.
  298. Jendoubi S, Martin A, Liétard L, Ben Hadji H and Ben Yaghlane B (2017). Two evidential data based models for influence maximization in Twitter, Knowledge-Based Systems, 121:C, (58-70), Online publication date: 1-Apr-2017.
  299. Lotfi Shahreza M, Ghadiri N, Mousavi S, Varshosaz J and Green J (2017). Heter-LP, Journal of Biomedical Informatics, 68:C, (167-183), Online publication date: 1-Apr-2017.
  300. Drif A, Boukerram A, Slimani Y and Giordano S (2017). Discovering Interest Based Mobile Communities, Mobile Networks and Applications, 22:2, (344-355), Online publication date: 1-Apr-2017.
  301. ACM
    Song C, Goswami K, Park Y, Chang S and Choo E Graphic model analysis of frauds in online consumer reviews Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, (1-7)
  302. ACM
    Meo P, Musial-Gabrys K, Rosaci D, Sarnè G and Aroyo L (2017). Using Centrality Measures to Predict Helpfulness-Based Reputation in Trust Networks, ACM Transactions on Internet Technology, 17:1, (1-20), Online publication date: 6-Mar-2017.
  303. Gonçalves V, Costa E, Valejo A, Filho G, Johnson T, Pessin G and Ueyama J (2017). Enhancing intelligence in multimodal emotion assessments, Applied Intelligence, 46:2, (470-486), Online publication date: 1-Mar-2017.
  304. Wu G (2017). On the convergence of the minimally irreducible Markov chain method with applications to PageRank, Calcolo: a quarterly on numerical analysis and theory of computation, 54:1, (267-279), Online publication date: 1-Mar-2017.
  305. Bai X, Yang P and Shi X (2017). An overlapping community detection algorithm based on density peaks, Neurocomputing, 226:C, (7-15), Online publication date: 22-Feb-2017.
  306. Stein J, Song H, Baldi M and Li J (2017). On the most representative summaries of network user activities, Computer Networks: The International Journal of Computer and Telecommunications Networking, 113:C, (205-217), Online publication date: 11-Feb-2017.
  307. Horák K, Bošanský B and Péchouček M Heuristic search value iteration for one-sided partially observable stochastic games Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, (558-564)
  308. Negahban S, Oh S and Shah D (2016). Rank Centrality, Operations Research, 65:1, (266-287), Online publication date: 1-Feb-2017.
  309. Yoshida T and Yamada Y (2017). A Community Structure-Based Approach for Network Immunization, Computational Intelligence, 33:1, (77-98), Online publication date: 1-Feb-2017.
  310. ACM
    Wu Q, Wang T, Cai Y, Tian H and Chen Y Rumor restraining based on propagation prediction with limited observations in large-scale social networks Proceedings of the Australasian Computer Science Week Multiconference, (1-8)
  311. Borassi M, Crescenzi P and Trevisan L An axiomatic and an average-case analysis of algorithms and heuristics for metric properties of graphs Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, (920-939)
  312. ACM
    Pham P, Erlandsson F and Wu S Social Coordinates Proceedings of the 2017 International Conference on Machine Learning and Soft Computing, (191-196)
  313. Abbe E (2017). Community detection and stochastic block models, The Journal of Machine Learning Research, 18:1, (6446-6531), Online publication date: 1-Jan-2017.
  314. Balachandran P, Kolaczyk E and Viles W (2017). On the propagation of low-rate measurement error to subgraph counts in large networks, The Journal of Machine Learning Research, 18:1, (2025-2057), Online publication date: 1-Jan-2017.
  315. Eisenberg D, Park J, Seager T and Hines P (2017). Sociotechnical Network Analysis for Power Grid Resilience in South Korea, Complexity, 2017, Online publication date: 1-Jan-2017.
  316. Yudhoatmojo S and Samuar M (2017). Community Detection On Citation Network Of DBLP Data Sample Set Using LinkRank Algorithm, Procedia Computer Science, 124:C, (29-37), Online publication date: 1-Jan-2017.
  317. Ferretti S (2017). On the modeling of musical solos as complex networks, Information Sciences: an International Journal, 375:C, (271-295), Online publication date: 1-Jan-2017.
  318. Atay Y, Koc I, Babaoglu I and Kodaz H (2017). Community detection from biological and social networks, Applied Soft Computing, 50:C, (194-211), Online publication date: 1-Jan-2017.
  319. Ramiro V, Lochin E and Snac P (2016). Characterization and applications of temporal random walks on opportunistic networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 111:C, (29-44), Online publication date: 24-Dec-2016.
  320. Skabar A Random vector generation from mixed-attribute datasets using random walk Proceedings of the 2016 Winter Simulation Conference, (1096-1107)
  321. Rutherford A, Ramadanović B, Ahrenberg L, Michelow W, Marshall B, Small W, Deering K, Montaner J and Vasarhelyi K Control of an HIV epidemic among injection drug users Proceedings of the 2016 Winter Simulation Conference, (23-37)
  322. Anagnostopoulos A, Łącki J, Lattanzi S, Leonardi S and Mahdian M Community detection on evolving graphs Proceedings of the 30th International Conference on Neural Information Processing Systems, (3530-3538)
  323. Shakeri H, Poggi-Corradini P, Scoglio C and Albin N (2016). Generalized network measures based on modulus of families of walks, Journal of Computational and Applied Mathematics, 307:C, (307-318), Online publication date: 1-Dec-2016.
  324. Yang W, Wang Z, Zuo Z, Yang C and Shi H (2016). Nodes selection strategy in cooperative tracking problem, Automatica (Journal of IFAC), 74:C, (118-125), Online publication date: 1-Dec-2016.
  325. TAKAYAMA Y and SAGA R (2016). Proposal of Chance Index in Co-occurrence Network, Electronics and Communications in Japan, 99:12, (65-73), Online publication date: 1-Dec-2016.
  326. de La Robertie B Assessing the Authors of Online Books in Digital Libraries Using Users Affinity Information Retrieval Technology, (315-321)
  327. ACM
    Ruohonen J, Šćepanović S, Hyrynsalmi S, Mishkovski I, Aura T and Leppänen V Correlating file-based malware graphs against the empirical ground truth of DNS graphs Proccedings of the 10th European Conference on Software Architecture Workshops, (1-6)
  328. ACM
    Sun P and Boukerche A Integrated Connectivity and Coverage Techniques for Wireless Sensor Networks Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access, (75-82)
  329. ACM
    Glantz R, Meyerhenke H and Schulz C (2016). Tree-Based Coarsening and Partitioning of Complex Networks, ACM Journal of Experimental Algorithmics, 21, (1-20), Online publication date: 4-Nov-2016.
  330. Morisi R, Gnecco G and Bemporad A (2016). A hierarchical consensus method for the approximation of the consensus state, based on clustering and spectral graph theory, Engineering Applications of Artificial Intelligence, 56:C, (157-174), Online publication date: 1-Nov-2016.
  331. McKeown K, Daume H, Chaturvedi S, Paparrizos J, Thadani K, Barrio P, Biran O, Bothe S, Collins M, Fleischmann K, Gravano L, Jha R, King B, McInerney K, Moon T, Neelakantan A, O'Seaghdha D, Radev D, Templeton C and Teufel S (2016). Predicting the impact of scientific concepts using full-text features, Journal of the Association for Information Science and Technology, 67:11, (2684-2696), Online publication date: 1-Nov-2016.
  332. ACM
    Ufimtsev V, Sarkar S, Mukherjee A and Bhowmick S Understanding Stability of Noisy Networks through Centrality Measures and Local Connections Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, (2347-2352)
  333. ACM
    Feng Q, Zhou R, Xu C, Cheng Y, Testa B and Yin H Scalable Graph-based Bug Search for Firmware Images Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (480-491)
  334. Ding C and Li K (2016). Estimating multilateral trade behaviors on the world trade web with limited information, Neurocomputing, 210:C, (66-80), Online publication date: 19-Oct-2016.
  335. Li X, Liu Y, Jiang Y and Liu X (2016). Identifying social influence in complex networks, Neurocomputing, 210:C, (141-154), Online publication date: 19-Oct-2016.
  336. Guedes G, Ogasawara E, Bezerra E and Xexeo G (2016). Discovering top-k non-redundant clusterings in attributed graphs, Neurocomputing, 210:C, (45-54), Online publication date: 19-Oct-2016.
  337. ACM
    Leskovec J and Sosič R (2016). SNAP, ACM Transactions on Intelligent Systems and Technology, 8:1, (1-20), Online publication date: 3-Oct-2016.
  338. Martinez V, Escalante M, Beguerisse-Díaz M, Garduño E and Gonzalez V (2016). Understanding Human Behavior in Urban Spaces using Social Network Data, International Journal of Web Services Research, 13:4, (54-66), Online publication date: 1-Oct-2016.
  339. Chen N, Liu X and Yao D (2016). An Optimization View of Financial Systemic Risk Modeling, Operations Research, 64:5, (1089-1108), Online publication date: 1-Oct-2016.
  340. Kandhway K and Kuri J (2016). Optimal Resource Allocation Over Time and Degree Classes for Maximizing Information Dissemination in Social Networks, IEEE/ACM Transactions on Networking, 24:5, (3204-3217), Online publication date: 1-Oct-2016.
  341. (2016). Micro-level dynamics of the online information propagation, Neural Networks, 82:C, (1-29), Online publication date: 1-Oct-2016.
  342. Khadangi E, Bagheri A and Shahmohammadi A (2016). Biased sampling from facebook multilayer activity network using learning automata, Applied Intelligence, 45:3, (829-849), Online publication date: 1-Oct-2016.
  343. Steen M and Tanenbaum A (2016). A brief introduction to distributed systems, Computing, 98:10, (967-1009), Online publication date: 1-Oct-2016.
  344. Tsitsvero M, Barbarossa S and Di Lorenzo P (2016). Signals on Graphs: Uncertainty Principle and Sampling, IEEE Transactions on Signal Processing, 64:18, (4845-4860), Online publication date: 15-Sep-2016.
  345. ACM
    Lioma C, Tarissan F, Simonsen J, Petersen C and Larsen B Exploiting the Bipartite Structure of Entity Grids for Document Coherence and Retrieval Proceedings of the 2016 ACM International Conference on the Theory of Information Retrieval, (11-20)
  346. Gunasekara R, Mehrotra K and Mohan C Improving the robustness of the smart grid using a multi-objective key player identification approach Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (1205-1212)
  347. Óskarsdóttir M, Bravo C, Verbeke W, Sarraute C, Baesens B and Vanthienen J A comparative study of social network classifiers for predicting churn in the telecommunication industry Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (1151-1158)
  348. Musciotto F, Delpriori S, Castagno P and Pournaras E Mining social interactions in privacy-preserving temporal networks Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (1103-1110)
  349. Sela A, Goldenberg D, Shmueli E and Ben-Gal I Scheduled seeding for latent viral marketing Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (642-643)
  350. Crescenzi P, Fraigniaud P, Lotker Z and Penna P Core-periphery clustering and collaboration networks Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (525-528)
  351. Yuan G, Murukannaiah P and Singh M Percimo Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (271-278)
  352. Achiam Y, Yahav I and Schwartz D Why not scale free? Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (174-177)
  353. Sarkar S, Bhowmick S, Kumar S and Mukherjee A Sensitivity and reliability in incomplete networks Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (69-72)
  354. ACM
    Riondato M and Upfal E ABRA Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1145-1154)
  355. ACM
    Siyari P, Dilkina B and Dovrolis C Lexis Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (1185-1194)
  356. Tremblay N and Borgnat P (2016). Subgraph-Based Filterbanks for Graph Signals, IEEE Transactions on Signal Processing, 64:15, (3827-3840), Online publication date: 1-Aug-2016.
  357. Scardapane S, Fierimonte R, Di Lorenzo P, Panella M and Uncini A (2016). Distributed semi-supervised support vector machines, Neural Networks, 80:C, (43-52), Online publication date: 1-Aug-2016.
  358. Meghanathan N (2016). Maximal assortative matching for real-world network graphs, random network graphs and scale-free network graphs, Vietnam Journal of Computer Science, 3:3, (151-179), Online publication date: 1-Aug-2016.
  359. Tang L and Ni Z (2016). Emerging opinion leaders in crowd unfollow crisis, Pattern Analysis & Applications, 19:3, (731-743), Online publication date: 1-Aug-2016.
  360. ACM
    Zuo X and Iamnitchi A (2016). A Survey of Socially Aware Peer-to-Peer Systems, ACM Computing Surveys, 49:1, (1-28), Online publication date: 28-Jul-2016.
  361. ACM
    Arora V and Ventresca M A Multi-objective Optimization Approach for Generating Complex Networks Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion, (15-16)
  362. ACM
    Hu T and Banzhaf W Quantitative Analysis of Evolvability using Vertex Centralities in Phenotype Network Proceedings of the Genetic and Evolutionary Computation Conference 2016, (733-740)
  363. ACM
    Ochoa G and Veerapen N Additional Dimensions to the Study of Funnels in Combinatorial Landscapes Proceedings of the Genetic and Evolutionary Computation Conference 2016, (373-380)
  364. Mocanu D On the synergy of network science and artificial intelligence Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (4020-4021)
  365. ACM
    Hamda K, Ishigaki G, Sakai Y and Shinomiya N Significance Analysis for Edges in a Graph by means of Leveling Variables on Nodes Proceedings of the 7th International Conference on Computing Communication and Networking Technologies, (1-5)
  366. Ji S, Li W, Gong N, Mittal P and Beyah R (2016). Seed-Based De-Anonymizability Quantification of Social Networks, IEEE Transactions on Information Forensics and Security, 11:7, (1398-1411), Online publication date: 1-Jul-2016.
  367. Costa A, Kushnarev S, Liberti L and Sun Z (2016). Divisive heuristic for modularity density maximization, Computers and Operations Research, 71:C, (100-109), Online publication date: 1-Jul-2016.
  368. Villarreal S and Schaeffer S (2016). Local bilateral clustering for identifying research topics and groups from bibliographical data, Knowledge and Information Systems, 48:1, (179-199), Online publication date: 1-Jul-2016.
  369. Visheratin A, Trofimenko T, Mukhina K, Nasonov D and Boukhanovsky A (2016). Urgent Information Spreading Multi-layer Model for Simulation in Mobile Networks, Procedia Computer Science, 80:C, (2086-2097), Online publication date: 1-Jun-2016.
  370. Ang L and Seng K (2016). Big Sensor Data Applications in Urban Environments, Big Data Research, 4:C, (1-12), Online publication date: 1-Jun-2016.
  371. Zhang Z, Fang H and Wang H (2016). Multiple Imputation based Clustering Validation (MIV) for Big Longitudinal Trial Data with Missing Values in eHealth, Journal of Medical Systems, 40:6, (1-9), Online publication date: 1-Jun-2016.
  372. ACM
    Walk S, Helic D, Geigl F and Strohmaier M (2016). Activity Dynamics in Collaboration Networks, ACM Transactions on the Web, 10:2, (1-32), Online publication date: 25-May-2016.
  373. ACM
    Drakopoulos G, Kanavos A and Tsakalidis A A Neo4j Implementation of Fuzzy Random Walkers Proceedings of the 9th Hellenic Conference on Artificial Intelligence, (1-8)
  374. ACM
    Benevenuto F, Laender A and Alves B (2016). How Connected are the ACM SIG Communities?, ACM SIGMOD Record, 44:4, (57-63), Online publication date: 9-May-2016.
  375. ACM
    Ji S, Li W, Srivatsa M, He J and Beyah R (2016). General Graph Data De-Anonymization, ACM Transactions on Information and System Security, 18:4, (1-29), Online publication date: 6-May-2016.
  376. Yang W, Wang Y, Wang X and Shi H (2016). Optimal Controlled Nodes Selection for Fast Consensus, Asian Journal of Control, 18:3, (932-944), Online publication date: 1-May-2016.
  377. Teng S (2016). Scalable Algorithms for Data and Network Analysis, Foundations and Trends® in Theoretical Computer Science, 12:1–2, (1-274), Online publication date: 1-May-2016.
  378. Sinha K and Weck O (2016). Empirical Validation of Structural Complexity Metric and Complexity Management for Engineering Systems, Systems Engineering, 19:3, (193-206), Online publication date: 1-May-2016.
  379. Ellinas C, Allan N and Johansson A (2016). Exploring Structural Patterns Across Evolved and Designed Systems, Systems Engineering, 19:3, (179-192), Online publication date: 1-May-2016.
  380. Borassi M, Crescenzi P and Habib M (2016). Into the Square, Electronic Notes in Theoretical Computer Science (ENTCS), 322:C, (51-67), Online publication date: 18-Apr-2016.
  381. Bonchi F, De Francisci Morales G and Riondato M Centrality Measures on Big Graphs Proceedings of the 25th International Conference Companion on World Wide Web, (1017-1020)
  382. Way S, Larremore D and Clauset A Gender, Productivity, and Prestige in Computer Science Faculty Hiring Networks Proceedings of the 25th International Conference on World Wide Web, (1169-1179)
  383. Romero D, Uzzi B and Kleinberg J Social Networks Under Stress Proceedings of the 25th International Conference on World Wide Web, (9-20)
  384. ACM
    Martins L, Nobre R, Cardoso J, Delbem A and Marques E (2016). Clustering-Based Selection for the Exploration of Compiler Optimization Sequences, ACM Transactions on Architecture and Code Optimization, 13:1, (1-28), Online publication date: 5-Apr-2016.
  385. ACM
    van Heeswijk W, Fletcher G and Pechenizkiy M On structure preserving sampling and approximate partitioning of graphs Proceedings of the 31st Annual ACM Symposium on Applied Computing, (875-882)
  386. Bouanan Y, Zacharewicz G, Vallespir B, Ribault J and Diallo S DEVS based network Proceedings of the Modeling and Simulation of Complexity in Intelligent, Adaptive and Autonomous Systems 2016 (MSCIAAS 2016) and Space Simulation for Planetary Space Exploration (SPACE 2016), (1-8)
  387. Meghanathan N (2016). Maximal assortative matching for complex network graphs, Journal of King Saud University - Computer and Information Sciences, 28:2, (230-246), Online publication date: 1-Apr-2016.
  388. ACM
    Basuchowdhuri P, Sikdar S, Shreshtha S and Majumder S Detecting Community Structures in Social Networks by Graph Sparsification Proceedings of the 3rd IKDD Conference on Data Science, 2016, (1-9)
  389. Zafarani R and Liu H (2016). Users joining multiple sites, Information Fusion, 28:C, (83-89), Online publication date: 1-Mar-2016.
  390. Santiago E, Velasco-Hernández J and Romero-Salcedo M (2016). A descriptive study of fracture networks in rocks using complex network metrics, Computers & Geosciences, 88:C, (97-114), Online publication date: 1-Mar-2016.
  391. Kandhway K and Kuri J (2016). Campaigning in heterogeneous social networks, IEEE/ACM Transactions on Networking, 24:1, (383-396), Online publication date: 1-Feb-2016.
  392. Ghosh S and Ruths J (2016). Structural control of single-input rank one bilinear systems, Automatica (Journal of IFAC), 64:C, (8-17), Online publication date: 1-Feb-2016.
  393. Min S and Park J Narrative as a Complex Network: A Study of Victor Hugo's Les Misérables Proceedings of HCI Korea, (100-107)
  394. Padua R, Carvalho V and Rezende S Post-processing Association Rules Proceedings of the 42nd International Conference on SOFSEM 2016: Theory and Practice of Computer Science - Volume 9587, (580-591)
  395. Kim M, Newth D and Christen P (2016). Macro-level information transfer in social media, Neurocomputing, 172:C, (84-99), Online publication date: 8-Jan-2016.
  396. Sulieman D, Malek M, Kadima H and Laurent D (2016). Toward Social-Semantic Recommender Systems, International Journal of Information Systems and Social Change, 7:1, (1-30), Online publication date: 1-Jan-2016.
  397. Pelechrinis K and Krishnamurthy P (2016). Socio-spatial affiliation networks, Computer Communications, 73:PB, (251-262), Online publication date: 1-Jan-2016.
  398. (2015). A heuristic branch-and-bound based thresholding algorithm for unveiling cognitive activity from EEG data, Neurocomputing, 170:C, (32-46), Online publication date: 25-Dec-2015.
  399. ACM
    Jiang W, Wu J and Wang G (2015). On Selecting Recommenders for Trust Evaluation in Online Social Networks, ACM Transactions on Internet Technology, 15:4, (1-21), Online publication date: 14-Dec-2015.
  400. Siheng Chen , Varma R, Sandryhaila A and Kovacevic J (2015). Discrete Signal Processing on Graphs: Sampling Theory, IEEE Transactions on Signal Processing, 63:24, (6510-6523), Online publication date: 1-Dec-2015.
  401. Cai Q, Gong M, Ruan S, Miao Q and Du H (2015). Network Structural Balance Based on Evolutionary Multiobjective Optimization: A Two-Step Approach, IEEE Transactions on Evolutionary Computation, 19:6, (903-916), Online publication date: 1-Dec-2015.
  402. de Anda-Jáuregui G, Mejía-Pedroza R, Espinal-Enríquez J and Hernández-Lemus E (2015). Crosstalk events in the estrogen signaling pathway may affect tamoxifen efficacy in breast cancer molecular subtypes, Computational Biology and Chemistry, 59:PB, (42-54), Online publication date: 1-Dec-2015.
  403. Xu Y, Xu H and Zhang D (2015). A novel disjoint community detection algorithm for social networks based on backbone degree and expansion, Expert Systems with Applications: An International Journal, 42:21, (8349-8360), Online publication date: 30-Nov-2015.
  404. (2015). Visualizing network communities with a semi-definite programming method, Information Sciences: an International Journal, 321:C, (1-13), Online publication date: 10-Nov-2015.
  405. Pin-Yu Chen and Hero A (2015). Deep Community Detection, IEEE Transactions on Signal Processing, 63:21, (5706-5719), Online publication date: 1-Nov-2015.
  406. Zhu Z, Su J and Kong L (2015). Measuring influence in online social network based on the user-content bipartite graph, Computers in Human Behavior, 52:C, (184-189), Online publication date: 1-Nov-2015.
  407. Ochoa G, Veerapen N, Whitley D and Burke E The Multi-Funnel Structure of TSP Fitness Landscapes Revised Selected Papers of the 12th International Conference on Artificial Evolution - Volume 9554, (1-13)
  408. ACM
    Geigl F, Lamprecht D, Hofmann-Wellenhof R, Walk S, Strohmaier M and Helic D Random surfers on a web encyclopedia Proceedings of the 15th International Conference on Knowledge Technologies and Data-driven Business, (1-8)
  409. Hayashi T, Akiba T and Yoshida Y (2015). Fully dynamic betweenness centrality maintenance on massive networks, Proceedings of the VLDB Endowment, 9:2, (48-59), Online publication date: 1-Oct-2015.
  410. Li W (2015). Highlighting data clusters by graph embedding, Neurocomputing, 165:C, (75-80), Online publication date: 1-Oct-2015.
  411. Veremyev A, Prokopyev O and Pasiliao E (2015). Critical nodes for distance-based connectivity and related problems in graphs, Networks, 66:3, (170-195), Online publication date: 1-Oct-2015.
  412. ACM
    Ribas S, Ribeiro-Neto B, Santos R, de Souza e Silva E, Ueda A and Ziviani N Random Walks on the Reputation Graph Proceedings of the 2015 International Conference on The Theory of Information Retrieval, (181-190)
  413. ACM
    Wei G, Walsh C, Cazan I and Marculescu R Molecular tweeting Proceedings of the 6th ACM Conference on Bioinformatics, Computational Biology and Health Informatics, (366-375)
  414. Siheng Chen , Sandryhaila A, Moura J and Kovacevic J (2015). Signal Recovery on Graphs: Variation Minimization, IEEE Transactions on Signal Processing, 63:17, (4609-4624), Online publication date: 1-Sep-2015.
  415. Das S and Moura J (2015). Distributed Kalman Filtering With Dynamic Observations Consensus, IEEE Transactions on Signal Processing, 63:17, (4458-4473), Online publication date: 1-Sep-2015.
  416. Holbert B, Tati S, Silvestri S, La Porta T and Swami A (2015). Network Topology Inference With Partial Information, IEEE Transactions on Network and Service Management, 12:3, (406-419), Online publication date: 1-Sep-2015.
  417. Berkhout J and Heidergott B (2015). Efficient Algorithm for Computing the Ergodic Projector of Markov Multi-chains, Procedia Computer Science, 51:C, (1818-1827), Online publication date: 1-Sep-2015.
  418. Zhao D, Wang L, Xu L and Wang Z (2015). Finding another yourself in multiplex networks, Applied Mathematics and Computation, 266:C, (599-604), Online publication date: 1-Sep-2015.
  419. ACM
    Lotker Z Voting algorithm in the play Julius Caesar Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (848-855)
  420. ACM
    Schlauch W, Zweig K, Theory G and Analysis N Influence of the Null-Model on Motif Detection Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (514-519)
  421. ACM
    Sela A, Ben-Gal I, Pentland A and Shmueli E Improving Information Spread through a Scheduled Seeding Approach Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (629-632)
  422. ACM
    Han W, Zhu X, Zhu Z, Chen W, Zheng W and Lu J Weibo, and a Tale of Two Worlds Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (121-128)
  423. ACM
    Lindner G, Staudt C, Hamann M, Meyerhenke H and Wagner D Structure-Preserving Sparsification of Social Networks Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (448-454)
  424. ACM
    Doran D, Yelne S, Massari L, Calzarossa M, Jackson L and Moriarty G Stay Awhile and Listen Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (667-674)
  425. ACM
    Horvát E, Uparna J and Uzzi B Network vs Market Relations Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (226-233)
  426. ACM
    Basu P, Sundaram R and Dippel M Multiplex networks Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (456-463)
  427. ACM
    Malliaros F and Skianis K Graph-Based Term Weighting for Text Categorization Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (1473-1479)
  428. ACM
    Geiß J, Spitz A and Gertz M Beyond Friendships and Followers Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, (472-479)
  429. ACM
    Dimitrov D, Singer P, Helic D and Strohmaier M The Role of Structural Information for Designing Navigational User Interfaces Proceedings of the 26th ACM Conference on Hypertext & Social Media, (59-68)
  430. ACM
    Han Y and Tang J Probabilistic Community and Role Model for Social Networks Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (407-416)
  431. Zhen Huang , Cheng Wang , Stojmenovi M and Nayak A (2015). Characterization of Cascading Failures in Interdependent Cyber-Physical Systems, IEEE Transactions on Computers, 64:8, (2158-2168), Online publication date: 1-Aug-2015.
  432. Liu Z, Jiang C, Wang J and Yu H (2015). The node importance in actual complex networks based on a multi-attribute ranking method, Knowledge-Based Systems, 84:C, (56-66), Online publication date: 1-Aug-2015.
  433. Bellalij M, Reichel L, Rodriguez G and Sadok H (2015). Bounding matrix functionals via partial global block Lanczos decomposition, Applied Numerical Mathematics, 94:C, (127-139), Online publication date: 1-Aug-2015.
  434. ACM
    Tiropanis T, Hall W, Crowcroft J, Contractor N and Tassiulas L (2015). Network science, web science, and internet science, Communications of the ACM, 58:8, (76-82), Online publication date: 23-Jul-2015.
  435. Asta D and Shalizi C Geometric network comparisons Proceedings of the Thirty-First Conference on Uncertainty in Artificial Intelligence, (102-110)
  436. ACM
    Ochoa G, Chicano F, Tinós R and Whitley D Tunnelling Crossover Networks Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (449-456)
  437. Avin C, Lotker Z, Nahum Y and Peleg D Core Size and Densification in Preferential Attachment Networks Proceedings, Part II, of the 42nd International Colloquium on Automata, Languages, and Programming - Volume 9135, (492-503)
  438. Achlioptas D and Siminelakis P Symmetric Graph Properties Have Independent Edges Proceedings, Part II, of the 42nd International Colloquium on Automata, Languages, and Programming - Volume 9135, (467-478)
  439. Segev E, Nissenbaum A, Stolero N and Shifman L (2015). Families and Networks of Internet Memes, Journal of Computer-Mediated Communication, 20:4, (417-433), Online publication date: 1-Jul-2015.
  440. ACM
    Jacobs A, Way S, Ugander J and Clauset A Assembling thefacebook Proceedings of the ACM Web Science Conference, (1-10)
  441. ACM
    Bögel T and Gertz M Time will Tell Proceedings of the 15th ACM/IEEE-CS Joint Conference on Digital Libraries, (195-204)
  442. Zhou F, Jiao J and Lei B (2015). A linear threshold-hurdle model for product adoption prediction incorporating social network effects, Information Sciences: an International Journal, 307:C, (95-109), Online publication date: 20-Jun-2015.
  443. Xing L, Le H and Hui Z (2015). A Novel Social Network Structural Balance Based on the Particle Swarm Optimization Algorithm, Cybernetics and Information Technologies, 15:2, (23-35), Online publication date: 1-Jun-2015.
  444. Kayes I, Kourtellis N, Quercia D, Iamnitchi A and Bonchi F The Social World of Content Abusers in Community Question Answering Proceedings of the 24th International Conference on World Wide Web, (570-580)
  445. Kardes H, Gunes M and Sarac K (2015). Graph Based Induction of unresponsive routers in Internet topologies, Computer Networks: The International Journal of Computer and Telecommunications Networking, 81:C, (178-200), Online publication date: 22-Apr-2015.
  446. Scardapane S, Wang D, Panella M and Uncini A (2015). Distributed learning for Random Vector Functional-Link networks, Information Sciences: an International Journal, 301:C, (271-284), Online publication date: 20-Apr-2015.
  447. ACM
    Bhardwaj K and Marculescu R Network-based Modeling and Analysis of Cloud Fraction and Precipitation Proceedings of the 1st ACM International Workshop on Cyber-Physical Systems for Smart Water Networks, (1-6)
  448. ACM
    Guedes G, Bezerra E, Ogasawara E and Xexéo G Exploring multiple clusterings in attributed graphs Proceedings of the 30th Annual ACM Symposium on Applied Computing, (915-918)
  449. ACM
    de Oliveira J, Quiles M, Maia M and Macau E Community detection, with lower time complexity, using coupled Kuramoto oscillators Proceedings of the 30th Annual ACM Symposium on Applied Computing, (1160-1166)
  450. Meghanathan N (2015). Correlations between Centrality Measures for Mobile Ad hoc Networks, International Journal of Wireless Networks and Broadband Technologies, 4:2, (15-27), Online publication date: 1-Apr-2015.
  451. ACM
    Suthers D From contingencies to network-level phenomena Proceedings of the Fifth International Conference on Learning Analytics And Knowledge, (368-377)
  452. Tati S, Bong Jun Ko , Guohong Cao , Swami A and La Porta T (2015). Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks, IEEE Transactions on Parallel and Distributed Systems, 26:3, (646-656), Online publication date: 1-Mar-2015.
  453. Christoff Z and Hansen J (2015). A logic for diffusion in social networks, Journal of Applied Logic, 13:1, (48-77), Online publication date: 1-Mar-2015.
  454. Rodriguez A, Kim B, Lee J, Coh B and Jeong M (2015). Graph kernel based measure for evaluating the influence of patents in a patent citation network, Expert Systems with Applications: An International Journal, 42:3, (1479-1486), Online publication date: 15-Feb-2015.
  455. Accongiagioco G, Gregori E and Lenzini L (2015). S-BITE, Computer Networks: The International Journal of Computer and Telecommunications Networking, 77:C, (73-89), Online publication date: 11-Feb-2015.
  456. Herrera M, Ramos-Martínez E, Izquierdo J and Pérez-García R (2015). Graph constrained label propagation on water supply networks, AI Communications, 28:1, (47-53), Online publication date: 1-Jan-2015.
  457. Barddal J, Gomes H and Enembreck F (2015). Advances on Concept Drift Detection in Regression Tasks Using Social Networks Theory, International Journal of Natural Computing Research, 5:1, (26-41), Online publication date: 1-Jan-2015.
  458. Vázquez-Rodas A and de la Cruz Llopis L (2015). A centrality-based topology control protocol for wireless mesh networks, Ad Hoc Networks, 24:PB, (34-54), Online publication date: 1-Jan-2015.
  459. Kraus V, Dehmer M and Emmert-Streib F (2014). Probabilistic inequalities for evaluating structural network measures, Information Sciences: an International Journal, 288:C, (220-245), Online publication date: 20-Dec-2014.
  460. ACM
    Silva T, Vaz de Melo P, Almeida J, Salles J and Loureiro A (2014). Revealing the City That We Cannot See, ACM Transactions on Internet Technology, 14:4, (1-23), Online publication date: 17-Dec-2014.
  461. ACM
    Mao W, Cai Z, Guan X and Towsley D Centrality metrics of importance in access behaviors and malware detections Proceedings of the 30th Annual Computer Security Applications Conference, (376-385)
  462. ACM
    Shao Y, Luo X, Qian C, Zhu P and Zhang L Towards a scalable resource-driven approach for detecting repackaged Android applications Proceedings of the 30th Annual Computer Security Applications Conference, (56-65)
  463. Fujiki Y and Haruna T Hodge decomposition of information flow on complex networks Proceedings of the 8th International Conference on Bioinspired Information and Communications Technologies, (103-112)
  464. Rafailidis D, Nanopoulos A and Constantinou E (2014). "With a little help from new friends", Journal of Systems and Software, 98:C, (1-8), Online publication date: 1-Dec-2014.
  465. ACM
    Yang X Social network analysis in open source software peer review Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (820-822)
  466. ACM
    Jin L, Takabi H, Long X and Joshi J Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links Proceedings of the 13th Workshop on Privacy in the Electronic Society, (59-68)
  467. ACM
    Ji S, Li W, Srivatsa M and Beyah R Structural Data De-anonymization Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, (1040-1053)
  468. ACM
    Sibaldo M, de Carvalho T, Ren T and Cavalcanti G Recommender System Based on Modularity Proceedings of the 2014 Recommender Systems Challenge, (58-61)
  469. Yuce S, Agarwal N, Wigand R, Lim M and Robinson R (2014). Bridging Women Rights Networks, Journal of Global Information Management, 22:4, (1-20), Online publication date: 1-Oct-2014.
  470. ACM
    Huang T, Ribeiro B, Madhyastha H and Faloutsos M The socio-monetary incentives of online social network malware campaigns Proceedings of the second ACM conference on Online social networks, (259-270)
  471. Zhang G, Liu L, Feng Y, Shao Z and Li Y (2014). Cext-N index, Scientometrics, 101:1, (291-307), Online publication date: 1-Oct-2014.
  472. ACM
    Bosu A and Carver J Impact of developer reputation on code review outcomes in OSS projects Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, (1-10)
  473. ACM
    Lu W and Miklau G Exponential random graph estimation under differential privacy Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, (921-930)
  474. Fu Y, Huang C and Sun C Using global diversity and local features to identify influential social network spreaders Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (948-953)
  475. Hosseinmardi H, Han R, Lv Q, Mishra S and Ghasemianlangroodi A Towards understanding cyberbullying behavior in a semi-anonymous social network Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (244-252)
  476. ACM
    Jin X, Liu H, Gandhi R, Kandula S, Mahajan R, Zhang M, Rexford J and Wattenhofer R Dynamic scheduling of network updates Proceedings of the 2014 ACM conference on SIGCOMM, (539-550)
  477. ACM
    Jones N, Paschos G, Shrader B and Modiano E An overlay architecture for throughput optimal multipath routing Proceedings of the 15th ACM international symposium on Mobile ad hoc networking and computing, (73-82)
  478. ACM
    Kayes I, Zuo X, Wang D and Chakareski J To Blog or Not to Blog Proceedings of the 2014 International Conference on Social Computing, (1-8)
  479. ACM
    Kuber K, Card S, Mehrotra K and Mohan C Rule networks in learning classifier systems Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation, (977-982)
  480. F. Vieira V, Xavier C, Ebecken N and Evsukoff A Modularity Based Hierarchical Community Detection in Networks Proceedings of the 14th International Conference on Computational Science and Its Applications — ICCSA 2014 - Volume 8584, (146-160)
  481. ACM
    Solé-Ribalta A, De Domenico M, Gómez S and Arenas A Centrality rankings in multiplex networks Proceedings of the 2014 ACM conference on Web science, (149-155)
  482. Vorobeychik Y, An B, Tambe M and Singh S Computing solutions in infinite-horizon discounted adversarial patrolling games Proceedings of the Twenty-Fourth International Conferenc on International Conference on Automated Planning and Scheduling, (314-322)
  483. ACM
    Martins L, Nobre R, Delbem A, Marques E and Cardoso J Exploration of compiler optimization sequences using clustering-based selection Proceedings of the 2014 SIGPLAN/SIGBED conference on Languages, compilers and tools for embedded systems, (63-72)
  484. ACM
    Çağlayan B, Bener A and Miranskyy A Factors affecting team evolution during software projects Proceedings of the 7th International Workshop on Cooperative and Human Aspects of Software Engineering, (16-23)
  485. Wang Y, Liang J and Lu J (2014). Discover hidden web properties by random walk on bipartite graph, Information Retrieval, 17:3, (203-228), Online publication date: 1-Jun-2014.
  486. ACM
    Martins L, Nobre R, Delbem A, Marques E and Cardoso J (2014). Exploration of compiler optimization sequences using clustering-based selection, ACM SIGPLAN Notices, 49:5, (63-72), Online publication date: 5-May-2014.
  487. Rohrer J, Jabbar A and Sterbenz J (2014). Path diversification for future internet end-to-end resilience and survivability, Telecommunications Systems, 56:1, (49-67), Online publication date: 1-May-2014.
  488. Zhao S, Zhang P, Li J, Tan A and Ye F (2014). Abstracting the core subnet of weighted networks based on link strengths, Journal of the Association for Information Science and Technology, 65:5, (984-994), Online publication date: 1-May-2014.
  489. ACM
    Lim Y, Ribeiro B and Towsley D Classifying latent infection states in complex networks Proceedings of the 23rd International Conference on World Wide Web, (719-722)
  490. ACM
    Kim M, Newth D and Christen P Macro-level information transfer across social networks Proceedings of the 23rd International Conference on World Wide Web, (321-322)
  491. ACM
    Devooght R, Mantrach A, Kivimäki I, Bersini H, Jaimes A and Saerens M Random walks based modularity Proceedings of the 23rd international conference on World wide web, (213-224)
  492. Meghanathan N (2014). Centrality-Based Connected Dominating Sets for Complex Network Graphs, International Journal of Interdisciplinary Telecommunications and Networking, 6:2, (1-24), Online publication date: 1-Apr-2014.
  493. ACM
    Rossi R, Lopes A and Rezende S A parameter-free label propagation algorithm using bipartite heterogeneous networks for text classification Proceedings of the 29th Annual ACM Symposium on Applied Computing, (79-84)
  494. ACM
    Barddal J, Gomes H and Enembreck F SFNClassifier Proceedings of the 29th Annual ACM Symposium on Applied Computing, (786-791)
  495. Leem B and Chun H (2014). An impact of online recommendation network on demand, Expert Systems with Applications: An International Journal, 41:4, (1723-1729), Online publication date: 1-Mar-2014.
  496. Lim J, Suh T, Gil J and Yu H (2014). Scalable and leaderless Byzantine consensus in cloud computing environments, Information Systems Frontiers, 16:1, (19-34), Online publication date: 1-Mar-2014.
  497. ACM
    Riondato M and Kornaropoulos E Fast approximation of betweenness centrality through sampling Proceedings of the 7th ACM international conference on Web search and data mining, (413-422)
  498. ACM
    Homan C, Lu N, Tu X, Lytle M and Silenzio V Social structure and depression in TrevorSpace Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, (615-625)
  499. Sinha A and Ramani K (2014). Multi-Scale Kernels Using Random Walks, Computer Graphics Forum, 33:1, (164-177), Online publication date: 1-Feb-2014.
  500. Cafieri S, Hansen P and Liberti L (2014). Improving heuristics for network modularity maximization using an exact algorithm, Discrete Applied Mathematics, 163:P1, (65-72), Online publication date: 30-Jan-2014.
  501. Basuchowdhuri P and Majumder S Finding Influential Nodes in Social Networks Using Minimum k-Hop Dominating Set Proceedings of the First International Conference on Applied Algorithms - Volume 8321, (137-151)
  502. Verbeke W, Martens D and Baesens B (2014). Social network analysis for customer churn prediction, Applied Soft Computing, 14, (431-446), Online publication date: 1-Jan-2014.
  503. Ahn S, Anderson K and Lee S Exploration of the effect of workers' influence network on their absence behavior using agent-based modeling and simulation Proceedings of the 2013 Winter Simulation Conference: Simulation: Making Decisions in a Complex World, (3059-3065)
  504. Chan S Generating Context Templates for Word Sense Disambiguation Proceedings of the 26th Australasian Joint Conference on AI 2013: Advances in Artificial Intelligence - Volume 8272, (466-477)
  505. ACM
    Vázquez-Rodas A and de la Cruz Llopis L Topology control for wireless mesh networks based on centrality metrics Proceedings of the 10th ACM symposium on Performance evaluation of wireless ad hoc, sensor, & ubiquitous networks, (25-32)
  506. Li W Modularity Segmentation Proceedings, Part II, of the 20th International Conference on Neural Information Processing - Volume 8227, (100-107)
  507. Li W Modularity Embedding Proceedings, Part II, of the 20th International Conference on Neural Information Processing - Volume 8227, (92-99)
  508. Gutierrez F, Zurita G, Ochoa S and Baloian N Analyzing Two Participation Strategies in an Undergraduate Course Community Proceedings of the 19th International Conference on Collaboration and Technology - Volume 8224, (143-158)
  509. ACM
    Kim M, Newth D and Christen P Modeling dynamics of meta-populations with a probabilistic approach Proceedings of the 22nd ACM international conference on Information & Knowledge Management, (489-498)
  510. Nadji Y, Antonakakis M, Perdisci R and Lee W Connected Colors Proceedings of the 16th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 8145, (390-410)
  511. Chan W and Gao B (2013). Unfair Consequence of Fair Competition in Service Systems---An Agent-Based and Queueing Approach, Service Science, 5:3, (249-262), Online publication date: 1-Sep-2013.
  512. Liu R, Agarwal S, Sindhgatta R and Lee J Accelerating collaboration in task assignment using a socially enhanced resource model Proceedings of the 11th international conference on Business Process Management, (251-258)
  513. ACM
    Van Vlasselaer V, Meskens J, Van Dromme D and Baesens B Using social network knowledge for detecting spider constructions in social security fraud Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (813-820)
  514. ACM
    Gunasekara R, Mehrotra K and Mohan C Multi-objective restructuring in social networks Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (277-281)
  515. ACM
    Paul P and Gavrilova M Cancelable fusion using social network analysis Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (1469-1471)
  516. ACM
    Zhang P, Wang X and Li B On predicting Twitter trend Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, (1427-1429)
  517. ACM
    Nguyen A, Senac P and Diaz M How disorder impacts routing in human-centric disruption tolerant networks Proceedings of the 2013 ACM SIGCOMM workshop on Future human-centric multimedia networking, (47-52)
  518. ACM
    Thakur G, Hui P and Helmy A Data-driven study of urban infrastructure to enable city-wide ubiquitous computing Proceedings of the 2nd International Workshop on Big Data, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications, (71-78)
  519. ACM
    Kim M, Newth D and Christen P Modeling direct and indirect influence across heterogeneous social networks Proceedings of the 7th Workshop on Social Network Mining and Analysis, (1-9)
  520. ACM
    Zheng H and Wu J Spectral graph multisection through orthogonality Proceedings of the 4th MultiClust Workshop on Multiple Clusterings, Multi-view Data, and Multi-source Knowledge-driven Clustering, (1-6)
  521. ACM
    Chandola V, Sukumar S and Schryver J Knowledge discovery from massive healthcare claims data Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (1312-1320)
  522. ACM
    Wang X and Sukthankar G Multi-label relational neighbor classification using social context features Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (464-472)
  523. ACM
    Weng L, Ratkiewicz J, Perra N, Gonçalves B, Castillo C, Bonchi F, Schifanella R, Menczer F and Flammini A The role of information diffusion in the evolution of social networks Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, (356-364)
  524. Huang D and Fu S Human factors modeling schemes for pilot-aircraft system Proceedings of the 10th international conference on Engineering Psychology and Cognitive Ergonomics: applications and services - Volume Part II, (144-149)
  525. Gertsbakh I and Shpungin Y Failure development in dependent networks Proceedings of the 2013 Summer Computer Simulation Conference, (1-7)
  526. ACM
    Bailey A, Ombuki-Berman B and Ventresca M Automatic inference of hierarchical graph models using genetic programming with an application to cortical networks Proceedings of the 15th annual conference on Genetic and evolutionary computation, (893-900)
  527. ACM
    Antonini A, Pensa R, Sapino M, Schifanella C, Teraoni Prioletti R and Vignaroli L Tracking and analyzing TV content on the web through social and ontological knowledge Proceedings of the 11th European Conference on Interactive TV and Video, (13-22)
  528. Ramírez-Ramírez L, Gel Y, Thompson M, de Villa E and McPherson M (2013). A new surveillance and spatio-temporal visualization tool SIMID, Computer Methods and Programs in Biomedicine, 110:3, (455-470), Online publication date: 1-Jun-2013.
  529. Zanetti M, Scholtes I, Tessone C and Schweitzer F Categorizing bugs with social networks: a case study on four open source software communities Proceedings of the 2013 International Conference on Software Engineering, (1032-1041)
  530. Omoronyia I, Cavallaro L, Salehie M, Pasquale L and Nuseibeh B Engineering adaptive privacy: on the role of privacy awareness requirements Proceedings of the 2013 International Conference on Software Engineering, (632-641)
  531. ACM
    Ugander J, Backstrom L and Kleinberg J Subgraph frequencies Proceedings of the 22nd international conference on World Wide Web, (1307-1318)
  532. ACM
    Pedro S, Appel A and Hruschka E Autonomously reviewing and validating the knowledge base of a never-ending learning system Proceedings of the 22nd International Conference on World Wide Web, (1195-1204)
  533. ACM
    Akkermans H and Bakhshi R Toward a next generation of network models for the web Proceedings of the 5th Annual ACM Web Science Conference, (1-10)
  534. Mirza F and Beltrán F Using an agent-based friend circle creator model to analyze drivers of consumer choice Proceedings of the 16th Communications & Networking Symposium, (1-5)
  535. Magnani M and Rossi L Formation of multiple networks Proceedings of the 6th international conference on Social Computing, Behavioral-Cultural Modeling and Prediction, (257-264)
  536. Li W (2013). Revealing network communities with a nonlinear programming method, Information Sciences: an International Journal, 229, (18-28), Online publication date: 1-Apr-2013.
  537. Haralambous Y New perspectives in sinographic language processing through the use of character structure Proceedings of the 14th international conference on Computational Linguistics and Intelligent Text Processing - Volume Part I, (201-217)
  538. ACM
    Mason W and Clauset A Friends FTW! friendship and competition in halo Proceedings of the 2013 conference on Computer supported cooperative work, (375-386)
  539. ACM
    Hulpus I, Hayes C, Karnstedt M and Greene D Unsupervised graph-based topic labelling using dbpedia Proceedings of the sixth ACM international conference on Web search and data mining, (465-474)
  540. Arefin A, Berretta R and Moscato P A GPU-based method for computing eigenvector centrality of gene-expression networks Proceedings of the Eleventh Australasian Symposium on Parallel and Distributed Computing - Volume 140, (3-11)
  541. Chen L, Li X and Han J MedRank Proceedings of the Twenty-Fourth Australasian Database Conference - Volume 137, (3-12)
  542. Shang Y (2013). Mixed SI (R) epidemic dynamics in random graphs with general degree distributions, Applied Mathematics and Computation, 219:10, (5042-5048), Online publication date: 1-Jan-2013.
  543. Laflin P, Mantzaris A, Ainley F, Otley A, Grindrod P and Higham D Dynamic targeting in an online social medium Proceedings of the 4th international conference on Social Informatics, (82-95)
  544. Kayes I, Qian X, Skvoretz J and Iamnitchi A How influential are you Proceedings of the 4th international conference on Social Informatics, (29-42)
  545. Yamada Y and Yoshida T A comparative study of community structure based node scores for network immunization Proceedings of the 8th international conference on Active Media Technology, (328-337)
  546. Grabis J, Chandra C and Kampars J (2012). Use of distributed data sources in facility location, Computers and Industrial Engineering, 63:4, (855-863), Online publication date: 1-Dec-2012.
  547. Santiago E, Romero-Salcedo M, Velasco-Hernández J, Velasquillo L and Hernández J An integrated strategy for analyzing flow conductivity of fractures in a naturally fractured reservoir using a complex network metric Proceedings of the 11th Mexican international conference on Advances in Computational Intelligence - Volume Part II, (350-361)
  548. Gharaibeh A, Constantinescu C, Lu M, Sharma A, Routray R, Sarkar P, Pease D and Ripeanu M CloudDT Proceedings of the 8th International Conference on Network and Service Management, (169-173)
  549. ACM
    Nguyen A, Senac P and Diaz M Understanding and modeling the small-world phenomenon in dynamic networks Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, (377-384)
  550. Oliva G, Santana F, de Oliveira K, de Souza C and Gerosa M Characterizing key developers Proceedings of the 18th international conference on Collaboration and Technology, (97-112)
  551. ACM
    Lima A and Musolesi M Spatial dissemination metrics for location-based social networks Proceedings of the 2012 ACM Conference on Ubiquitous Computing, (972-979)
  552. ACM
    Xu S, Lu W and Xu L (2012). Push- and pull-based epidemic spreading in networks, ACM Transactions on Autonomous and Adaptive Systems, 7:3, (1-26), Online publication date: 1-Sep-2012.
  553. Barajas-RamíRez J (2012). Robust synchronization of a class of uncertain complex networks via discontinuous control, Computers & Mathematics with Applications, 64:5, (956-964), Online publication date: 1-Sep-2012.
  554. Gach O and Hao J A memetic algorithm for community detection in complex networks Proceedings of the 12th international conference on Parallel Problem Solving from Nature - Volume Part II, (327-336)
  555. Sulieman D, Malek M, Kadima H and Laurent D Graph Searching Algorithms for Semantic-Social Recommendation Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (733-738)
  556. Dorn I, Lindenblatt A and Zweig K The Trilemma of Network Analysis Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), (9-14)
  557. Letchford J and Vorobeychik Y Computing optimal security strategies for interdependent assets Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence, (459-468)
  558. Freno A, Keller M, Garriga G and Tommasi M Spectral estimation of conditional random graph models for large-scale network data Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence, (265-274)
  559. ACM
    Mehler A and Stegbauer C On the self-similarity of intertextual structures in Wikipedia Proceedings of the First ACM International Workshop on Hot Topics on Interdisciplinary Social Networks Research, (65-68)
  560. ACM
    Lu J and Li D Sampling online social networks by random walk Proceedings of the First ACM International Workshop on Hot Topics on Interdisciplinary Social Networks Research, (33-40)
  561. Shen J, Brdiczka O, Ducheneaut N, Yee N and Begole B Inferring personality of online gamers by fusing multiple-view predictions Proceedings of the 20th international conference on User Modeling, Adaptation, and Personalization, (261-273)
  562. ACM
    Bailey A, Ventresca M and Ombuki-Berman B Automatic generation of graph models for complex networks by genetic programming Proceedings of the 14th annual conference on Genetic and evolutionary computation, (711-718)
  563. ACM
    Akkermans H Web dynamics as a random walk Proceedings of the 4th Annual ACM Web Science Conference, (1-10)
  564. Ebden M, Huynh T, Moreau L, Ramchurn S and Roberts S Network analysis on provenance graphs from a crowdsourcing application Proceedings of the 4th international conference on Provenance and Annotation of Data and Processes, (168-182)
  565. ACM
    de Souza e Silva E and Menasche D Applications of machine learning to performance evaluation Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems, (431-432)
  566. ACM
    de Souza e Silva E and Menasche D (2012). Applications of machine learning to performance evaluation, ACM SIGMETRICS Performance Evaluation Review, 40:1, (431-432), Online publication date: 7-Jun-2012.
  567. Serrano Zanetti M The co-evolution of socio-technical structures in sustainable software development: lessons from the open source software communities Proceedings of the 34th International Conference on Software Engineering, (1587-1590)
  568. Lim J, Chung K, Chin S and Yu H A gossip-based mutual exclusion algorithm for cloud environments Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing, (31-45)
  569. ACM
    Siemens G Learning analytics Proceedings of the 2nd International Conference on Learning Analytics and Knowledge, (4-8)
  570. Wang C and Szeto K Sales potential optimization on directed social networks Proceedings of the 2012t European conference on Applications of Evolutionary Computation, (114-123)
  571. Pavlovic D and Meadows C Actor-Network procedures Proceedings of the 8th international conference on Distributed Computing and Internet Technology, (7-26)
  572. Ben Hamida A, Kon F, Ansaldi Oliva G, Dos Santos C, Lorré J, Autili M, De Angelis G, Zarras A, Georgantas N, Issarny V and Bertolino A An integrated development and runtime environment for the future internet The Future Internet, (81-92)
  573. ACM
    Yang Z and Lui J (2011). Investigating the effect of node heterogeneity and network externality on security adoption, ACM SIGMETRICS Performance Evaluation Review, 39:3, (52-54), Online publication date: 21-Dec-2011.
  574. Bhavnani S, Victor S, Calhoun W, Busse W, Bleecker E, Castro M, Ju H, Pillai R, Oezguen N, Bellala G and Brasier A (2011). How cytokines co-occur across asthma patients, Journal of Biomedical Informatics, 44:S1, (S24-S30), Online publication date: 1-Dec-2011.
  575. ACM
    Chapman T and Kalyanaraman A An OpenMP algorithm and implementation for clustering biological graphs Proceedings of the 1st Workshop on Irregular Applications: Architectures and Algorithms, (3-10)
  576. ACM
    Li R, Yu J and Liu J Link prediction Proceedings of the 20th ACM international conference on Information and knowledge management, (1147-1156)
  577. ACM
    Balinsky H, Balinsky A and Simske S Automatic text summarization and small-world networks Proceedings of the 11th ACM symposium on Document engineering, (175-184)
  578. Sato S, Takahashi M, Nakamura T and Matsuo M Revealing Associations between Events and Their Characteristic Items Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01, (243-248)
  579. ACM
    Zhao P, Li X, Xin D and Han J Graph cube Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, (853-864)
  580. ACM
    Liu X and Murata T Extracting the mesoscopic structure from heterogeneous systems Proceedings of the 22nd ACM conference on Hypertext and hypermedia, (211-220)
  581. Buesser P, Daolio F and Tomassini M Optimizing the robustness of scale-free networks with simulated annealing Proceedings of the 10th international conference on Adaptive and natural computing algorithms - Volume Part II, (167-176)
  582. ACM
    Weiss M and Sari S Evolution of the mashup ecosystem by copying Proceedings of the 3rd and 4th International Workshop on Web APIs and Services Mashups, (1-7)
  583. Estrada E Structural patterns in complex networks through spectral analysis Proceedings of the 2010 joint IAPR international conference on Structural, syntactic, and statistical pattern recognition, (45-59)
  584. Agus M, Peró-Cebollero M, Guàrdia-Olmos J and Penna M Dealing with probabilistic problems in health care: What about the role of knowledge in daily life? 2020 IEEE International Symposium on Medical Measurements and Applications (MeMeA), (1-6)
  585. Pal S, Dong Y, Thapa B, Chawla N, Swami A and Ramanathan R Deep learning for network analysis: Problems, approaches and challenges MILCOM 2016 - 2016 IEEE Military Communications Conference, (588-593)
  586. Paulius D, Huang Y, Milton R, Buchanan W, Sam J and Sun Y Functional object-oriented network for manipulation learning 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), (2655-2662)
  587. Ji S, Li W, Yang S, Mittal P and Beyah R On the relative de-anonymizability of graph data: Quantification and evaluation IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, (1-9)
  588. Chen S, Varma R, Singh A and Kovačević J Representations of piecewise smooth signals on graphs 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (6370-6374)
  589. Chen P, Choudhury S and Hero A Multi-centrality graph spectral decompositions and their application to cyber intrusion detection 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4553-4557)
  590. Zhang J and Moura J Finding unique dense communities 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4109-4113)
  591. Teke O and Vaidyanathan P Graph filter banks with M-channels, maximal decimation, and perfect reconstruction 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (4089-4093)
  592. Fierimonte R, Barbato M, Rosato A and Panella M Distributed learning of Random Weights Fuzzy Neural Networks 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (2287-2294)
  593. Medland M, Harrison K and Ombuki-Berman B Automatic inference of graph models for directed complex networks using genetic programming 2016 IEEE Congress on Evolutionary Computation (CEC), (2337-2344)
  594. Wang W and Tang C Distributed estimation of betweenness centrality 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (250-257)
  595. Paarporn K, Eksin C, Weitz J and Shamma J Epidemic spread over networks with agent awareness and social distancing 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (51-57)
  596. Victor F and Lüders B Measuring Ethereum-Based ERC20 Token Networks Financial Cryptography and Data Security, (113-129)
Contributors
  • University of Michigan, Ann Arbor

Recommendations

H. Van Dyke Parunak

The modern study of networks has become a prototype of interdisciplinary research. Sociologists, computer scientists, chemists, economists, power engineers, transportation engineers, and a host of other communities whose problem domains consist of things in relation with one another employ networks as descriptive tools. The analysis of networks as objects of study in their own right, rather than simply as natural representations for a domain, began within these different communities, but has recently become its own specialty. For the past decade, Newman, a theoretical physicist who started his career studying quasicrystals, has been demonstrating the power of tools from mathematical physics in studying networks. His earlier collection of classic papers on the subject [1] was a great service to newcomers to the field, who will now welcome his unified textbook on the theme. This volume distinguishes itself from other network texts by its attention to the breadth of both the areas to which networks have been applied and the techniques for reasoning about them. The book is organized into five parts. The first part surveys networks as representations in four broad application areas: technological systems (such as the Internet, power grids, and road networks), social systems, information networks (including citation and hyperlinked networks), and biological networks. This detailed grounding in real-world problems will motivate many readers to explore the detailed formal exposition in the later sections. Part 2 provides a mathematical toolbox for describing and reasoning about networks. Newman's mathematical exposition is at once formally rigorous and pedagogically lucid. Coupled with the very practical orientation of Part 1, it will hold the attention of readers who might otherwise be impatient with detailed formalisms, and it should raise the standard of network discourse in communities where the focus is on the use rather than the theory of networks. Most networks of concern today are so large that their study requires the use of a computer. Part 3 summarizes a range of relevant algorithms. Computer scientists will miss the accustomed pseudocode representation of algorithms, which Newman prefers to describe verbally, but the descriptions are unambiguous and accompanied with a careful analysis of computational complexity. Part 4 describes various network models, including numerous variations of the random graph and a variety of models driven by specific growth models. These models cover the dynamics of a network as it forms. Part 5 discusses the dynamics of other processes constrained to operate on a network, including percolation, epidemics, more general dynamical systems, and search. One very recent area that is not explored in depth is the interaction between these two, in which processes on networks modify the structure of the networks themselves. The volume includes exercises at the end of each chapter, a comprehensive integrated bibliography, and an index. It is likely to become the standard introductory textbook for the study of networks, and it is valuable as a desk-side reference for anyone who works with network problems. Online Computing Reviews Service

Fernando Berzal

Networks have always been relevant to computer scientists, since graphs provide a nice mathematical model to represent relationships of any kind. However, until the publication of some significant network models around the turn of the century [1,2], they were not in the spotlight in scientific domains other than social networks and mathematical graph theory. The early models spurred the development of the study of networks as an interdisciplinary field, with myriad applications in computer science, sociology, economics, physics, biology, and many other realms of scientific endeavor. Until recently, in order to get an idea of the state of the art in the field of networks, scientists and researchers had to wade through journal papers, resort to some published surveys, and peruse major paper collections [3]; more general overviews were only available from popular science titles [4,5]. Fortunately, several recent textbooks have tried to organize what is currently known about networks and their structure and behavior, from different points of view [6,7,8]. Newman adds a new perspective-that of a physicist with a keen eye on networks-to this collection of textbooks. Newman's book consists of five parts of increasing complexity, from an informative description of different types of networks to the study of dynamic processes on networks. His writing style is engaging, witty, clear, and instructive-and mathematically rigorous when needed-without being condescending. The book starts with a survey of the most relevant kinds of technological, social, information, and biological networks, as well as the empirical techniques used to discover their structures. The second part of the book focuses on network theory in general, beyond particular application domains. It provides the fundamental mathematical tools needed for the scientific study of networks, along with a nice introduction to graph theory and a thorough survey of the measures and metrics employed to characterize networks. This part ends with a chapter on the large-scale structure of networks, including their connectivity, shortest paths, degree distributions, and clustering coefficients. Algorithms for networks are discussed in the next part. After an introductory chapter on data structures and algorithmic complexity for non-computer scientists, Part 3 complements Part 2 by providing efficient algorithmic solutions for computing some of the most common network features: clustering coefficients, shortest paths, and maximum flows/minimum costs. It also analyzes matrix algorithms for computing matrix eigenvalues and eigenvectors-which are needed for some centrality metrics-and discusses the problem of graph partitioning and community detection in networks. Part 4 is the most mathematically demanding, since it deals with theoretical network models. Its pages are devoted to the study of random graphs, different models of network formation, and other relevant network models. Starting from classic results attributed to Erd?s and Rényi, Newman analyzes and proves the formal properties of random graphs with arbitrary degree distributions (such as the configuration model), preferential attachment models (such as the Barab?si-Albert model), vertex copying models, network optimization models, and exponential random graphs. Beyond the mathematical proofs and the formal study of particular models-which may not always correspond to what is found in practice-the reader gets a general understanding of network properties and what might lie behind them. For example, in Section 13.3, "Excess Degree Distributions," readers will discover that, in general, "your friends have more friends than you do." The last part of the book turns attention toward processes on networks. Although still in its infancy as a research area, some interesting results are discussed. For instance, Newman discusses what happens when nodes are removed-a process that physicists refer to as "percolation." This process has severe implications concerning network resilience, and has application as a model for the effects of vaccination. The related issue of epidemics is also studied, by applying classical epidemiological models on networks in order to analyze the spread of diseases, fads, and ideas. The last couple of chapters provide a general overview of stability analysis, synchronization, search, and message passing on networks. Overall, this is an excellent textbook for the growing field of networks. It is cleverly written and suitable as both an introduction for undergraduate students (particularly Parts 1 to 3) and as a roadmap for graduate students. Furthermore, its more than 300 bibliographic references will guide readers who are interested in particular topics. Being highly self-contained, computer scientists and professionals from other fields can also use the book-in fact, the author himself is a physicist. In short, this book is a delight for the inquisitive mind. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.