1 |
Richardson, M. and P. Domingos, "Mining knowledge-sharing sites for viral marketing," Proceedings of the 9th ACM SIGKDD international conference on Knowledge discovery and data mining, (2002), 61-70.
|
2 |
Conti, S., Giordano, M. May, and A. Passarella, "From opportunistic networks to opportunistic computing," IEEE Communications Magazine, Vol.48, No. 9(2010), 126-139.
DOI
|
3 |
Chen, W., C. Wang and Y. Wang, "Scalable influence maximization for prevalent viral marketing in large-scale social networks," Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (2010), 1029-1038.
|
4 |
Lu, Z., Y. Wen and G. Cao, "Information diffusion in mobile social networks: The speed perspective," Proceedings of IEEE INFOCOM, (2014), 1932-1940.
|
5 |
Chen, X. and K. Xiong, "Dynamic social feature-based diffusion in mobile social networks," Proceedings of IEEE/CIC International Conference on Communications in China (ICCC), (2015), 1-6.
|
6 |
Myers S. A., C. Zhu and J. Leskovec, "Information diffusion and external influence in networks," Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, (2012), 33-41.
|
7 |
Tsai T. C. and H. H. Chan, "NCCU Trace: social-network-aware mobility trace," IEEE Communications Magazine, Vol.53, No. 10(2015), 144-149.
DOI
|
8 |
Domingos P. and M. Richardson, "Mining the network value of customers," Proceedings of the 7th ACM SIGKDD international conference on Knowledge discovery and data mining, (2001), 57-66.
|
9 |
Kempe D., J. Kleinberg and E. Tardos, "Maximizing the spread of influence through a social network," Proceedings of the 9th ACM SIGKDD international conference on Knowledge discovery and data mining, (2003), 137-146.
|
10 |
Wang Y., G. Cong, G. Song and K. Xie, "Community-based greedy algorithm for mining top-k influential nodes in mobile social networks," Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, (2010), 1039-1048.
|
11 |
Christakis N. A. and J. H. Fowler, "The spread of obesity in a large social network over 32 years," New England journal of medicine, Vol.357, No. 4(2007), 370-379.
DOI
|
12 |
Bakshy E., I. Rosenn, C. Marlow and L. Adamic, "The role of social networks in information diffusion," Proceedings of the 21st international conference on World Wide Web. ACM, (2012), 519-528.
|
13 |
Lopez-Pintado D., "Diffusion in complex social networks," Games and Economic Behavior, Vol.62, No. 2(2008), 573-590.
DOI
|
14 |
Keranen A., J. Ott and T. Karkkainen, "The ONE simulator for DTN protocol evaluation," Proceedings of the 2nd International Conference on Simulation Tools and Techniques, (2009), 1-10.
|
15 |
Han, B., P. Hui, V. S. A. Kumar, M. V. Marathe, J. Shao and A. Srinivasan, "Mobile data offloading through opportunistic communications and social participation," IEEE Transactions on Mobile Computing, Vol.11, No. 5(2012), 821-834.
DOI
|
16 |
Ester M., H. P. Kriegel, J. Sander and X. Xu, "A density-based algorithm for discovering clusters in large spatial databases with noise," kdd, Vol.96 No. 34(1996), 226-231.
|
17 |
Opsahl T., F. Agneessens and J. Skvoretz, "Node centrality in weighted networks: Generalizing degree and shortest paths," Social networks, Vol.32 No. 3(2010), 245-251.
DOI
|
18 |
Ma, H., H. Yang, M. R. Lyu and I. King, "Mining social networks using heat diffusion processes for marketing candidates selection," Proceedings of the 17th ACM conference on Information and knowledge management, (2008), 233-242.
|