Identifying structural hole spanners to maximally block information propagation
From MaRDI portal
Publication:2656743
Recommendations
- Identifying structural hole spanners in social networks via graph embedding
- Mining algorithm of E-Burt structural hole based on two-step neighbor
- Structural holes in social networks with exogenous cliques
- Blocking adversarial influence in social networks
- Community-based rumor blocking maximization in social networks: algorithms and analysis
Cites work
- BOULWARE STATE IN EXACTLY SOLVABLE MODELS OF 2D DILATON GRAVITY
- Community structure in social and biological networks
- Efficient and effective influence maximization in social networks: a hybrid-approach
- Finding dominators revisited (extended abstract)
- Finding top-\(k\) influential users in social networks under the structural diversity model
- Finding weighted \(k\)-truss communities in large networks
- Identification of influential users in social networks based on users' interest
- Probability and Computing
- Structural holes in social networks
Cited in
(4)- Enhanced by mobility? Effect of users' mobility on information diffusion in coupled online social networks
- Identifying structural hole spanners in social networks via graph embedding
- Mining algorithm of E-Burt structural hole based on two-step neighbor
- Efficient algorithms for finding diversified top-\(k\) structural hole spanners in social networks
This page was built for publication: Identifying structural hole spanners to maximally block information propagation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2656743)