Abstract
Diffusion speed and scale depend on all kinds of information, not just which users have the most or fewest connections.
- Adamic, L.A. and Glance, N. The political blogosphere and the 2004 U.S. election: Divided they blog. In Proceedings of the Third International Workshop on Link Discovery (Chicago, IL, Aug. 21--25). ACM Press, New York, 2005, 36--43. Google ScholarDigital Library
- Albert, R. and Barabási, A.-L. Statistical mechanics of complex networks. Reviews of Modern Physics 74, 1 (Jan. 2002), 47--97.Google ScholarCross Ref
- Borgatti, S.P. Centrality and network flow. Social Networks 27, 1 (Jan. 2005), 55--71.Google ScholarCross Ref
- De Meo, P., Ferrara, E., Fiumara, G., and Provetti, A. On Facebook, most ties are weak. Commun. ACM 57, 11 (Oct. 2014), 78--84. Google ScholarDigital Library
- Doerr, B., Fouz, M., and Friedrich, T. Why rumors spread so quickly in social networks. Commun. ACM 55, 6 (June 2012), 70--75. Google ScholarDigital Library
- Gao, C. and Liu, J.M. Network-based modeling for characterizing human collective behaviors during extreme events. IEEE Transactions on System, Man, and Cybernetics: Systems 47, 1 (Jan. 2017), 171--183.Google Scholar
- Gao, C., and Liu, J.M. Modeling and restraining mobile virus propagation. IEEE Transactions on Mobile Computing 12, 3 (Mar. 2013), 529--541. Google ScholarDigital Library
- 8 Goel, S., Watts, D.J., and Goldstein, D.G. The structure of online diffusion networks. In Proceedings of the 13<sup>th</sup> ACM Conference on Electronic Commerce (Valencia, Spain, June 4--8). ACM Press, New York, 2012, 623--638. Google ScholarDigital Library
- Guimerá, R., Danon, L., Díaz-Guilera, A., Giralt, F., and Arenas, A. Self-similar community structure in a network of human interactions. Physical Review E 68, 6 (Dec. 2003), 065103.Google ScholarCross Ref
- Howard, B. Analyzing online social networks. Commun. ACM 51, 11 (Nov. 2008), 14--16. Google ScholarDigital Library
- Kitsak, M., Gallos, L.K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H.E., and Makse, H.A. Identification of influential spreaders in complex networks. Nature Physics 6, 11 (Aug. 2010), 888--893.Google ScholarCross Ref
- Lancichinetti, A., Fortunato, S., and Radicchi, F. Benchmark graphs for testing community detection algorithms. Physical Review E 78, 4 (Oct. 2008).Google ScholarCross Ref
- Leskovec, J., Kleinberg, J., and Faloutsos, C. Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data 1, 1 (Mar. 2007). Google ScholarDigital Library
- Liu, Y.Y., Slotine, J.J., and Barabási, A.-L. Controllability of complex networks. Nature 473, 7346 (May 2011), 167--173.Google ScholarCross Ref
- McGoogan, C. What is WannaCry and how does ransomware work? The Telegraph (May 18, 2017); http://www.telegraph.co.uk/technology/0/ransomware-does-work/Google Scholar
- Nematzadeh, A., Ferrara, E., Flammini, A., and Ahn, Y.-Y. Optimal network modularity for information diffusion. Physical Review Letters 113, 8 (Aug. 2014), 088701.Google Scholar
- Newman, M.E.J. Modularity and community structure in networks. Proceedings of the National Academy of Sciences 103, 23 (June 2006), 8577--8582.Google ScholarCross Ref
- Newman, M.E.J. Co-authorship networks and patterns of scientific collaboration. Proceedings of the National Academy of Sciences 101, Supplement 1 (Apr. 2004), 5200--5205.Google ScholarCross Ref
- Ranjbar, A. and Maheswaran, M. Using community structure to control information sharing in online social networks. Computer Communications 41 (Jan. 2014), 11--21. Google ScholarDigital Library
- Wang, W., Tang, M., Stanley, H.E., and Braunstein, L.A. Unification of theoretical approaches for epidemic spreading on complex networks. Reports on Progress in Physics 80, 3 (Feb. 2017), 036603.Google ScholarCross Ref
- Xie, J.R., Kelley, S., and Szymanski, B.K. Overlapping community detection in networks: The state-of-the-art and comparative study. ACM Computing Surveys 45, 4 (Aug. 2013), 43:1--43:35. Google ScholarDigital Library
- Zou, C.C., Towsley D., and Gong W. Modeling and simulation study of the propagation and defense of Internet e-mail worms. IEEE Transactions on Dependable and Secure Computing 4, 2 (Apr. 2007), 105--118. Google ScholarDigital Library
Index Terms
- Even central users do not always drive information diffusion
Recommendations
Anomalous information diffusion in social networks: Twitter and Digg
Highlights- A new characteristic of diffusion type in social networks is introduced.
- ...
AbstractDiffusion is an important phenomenon in different sciences like epidemiology, economy, biology and social sciences. Information diffusion is mainly important for two reasons, to study and forecast diffusion growth and to find the ...
Graphical abstractDisplay Omitted
Temporal Behavior of Social Network Users in Information Diffusion
WI-IAT '14: Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 02The rapid development of online social networks (OSN) renders them a powerful tool for information diffusion. Understanding the temporal behavior of OSN users is critical in studying the diffusion process. While there is much work on building various ...
A New Direct-Drive Induction Flux Modulation Motor
2020 International Conference on Electrical Machines (ICEM)The flux modulation motor has gained interest in the past decade. Its main features are a low-speed operation and a high torque density due to the magnetic gearing effect, making this motor suitable for direct-drive applications. Most of researches are ...
Comments