|
[1] W. Chen, Y. Wang, and S. Yang, \Efficient influence maximization in social networks," in ACM SIGKDD, 2009. [2] S. Tang, J. Yuan, X. Mao, X. Y. Li, W. Chen, and G. Dai, \Relationship classification in large scale online social networks and its impact on information propagation," in IEEE INFOCOM, 2011. [3] P. Domingos and M. Richardson, “Mining the network value of customers,” in ACM SIGKDD, 2001. [4] M. Richardson and P. Domingos, “Mining knowledge-sharing sites for viral marketing,” in ACM SIGKDD, 2002. [5] D. Kempe, J. Kleinberg, and E. Tardos, “Maximizing the spread of influence through a social network,” in ACM SIGKDD, 2003. [6] Y. Zhang, J. Zhou, and J. Cheng, “Preference-based top-k influential nodes mining in social networks,” in IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2011. [7] H. Zhang, T. N. Dinh, and M. T. Thai, “Maximizing the spread of positive influence in online social networks,” in IEEE International Conference on Distributed Computing Systems, 2013. [8] L. G. Schiffman and L. L. Kanuk, Consumer Behavior. Prentice HalL, 2003. 28 [9] S. Liu, L. Ying, and S. Shakkottai, “Influence maximization in social networks: An ising-model-based approach,” in IEEE International Conference on Annual Allerton, 2010. [10] H. Kim and E. Yoneki, “Influential neighbours selection for information diffusion in online social networks,” in IEEE International Conference on Computer Communications and Networks, 2012. [11] D. T. Nguyen, S. Das, and M. T. Thai, “Influence maximization in multiple online social networks,” in IEEE Globecom, 2013. [12] S. Khuller, A. Moss, and J. Naor, “The budgeted maximum coverage problem,” in Information Processing Letters, 1999. [13] Crawdad. [Online]. Available: http://crawdad.cs.dartmouth.edu [14] Last.fm. [Online]. Available: http://www.last.fm. [15] C. J. Lin, C. W. Chen, and C. F. Chou, “Preference-aware content dissemination in opportunistic mobile social networks,” in IEEE INFOCOM, 2012. [16] W. Gao, G. Cao, T. L. Porta, and J. Han, “On exploiting transient social contact patterns for data forwarding in delay-tolerant networks,” in IEEE Transactions on Mobile Computing, 2013. [17] J. Dawes, “Do data characteristics change according to the number of scale points used? an experiment using 5 point, 7 point and 10 point scales,” in MRS IJMR, 2008. [18] X. F. Dejun Yang and G. Xue, “Espn: Efficient server placement in probabilistic networks with budget constraint,” INFOCOM'11, pp. 1269 ~1277.
|