2011
DOI: 10.1007/978-3-642-23780-5_15
|View full text |Cite
|
Sign up to set email alerts
|

Peer and Authority Pressure in Information-Propagation Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 14 publications
0
16
0
Order By: Relevance
“…We can observe that the PA model fails to qualitatively reproduce the fragility evolution pattern (r k initially increases and after a time point it starts decreasing gradually leading to robust enough graphs). More precisely, the first observation is that for small values of m (i.e., m = [2,4]), the robustness seems to remain almost constant, independently of the graph size. This can be explained by the structural properties of the graphs generated by the PA model.…”
Section: Preferential Attachment Modelmentioning
confidence: 94%
See 2 more Smart Citations
“…We can observe that the PA model fails to qualitatively reproduce the fragility evolution pattern (r k initially increases and after a time point it starts decreasing gradually leading to robust enough graphs). More precisely, the first observation is that for small values of m (i.e., m = [2,4]), the robustness seems to remain almost constant, independently of the graph size. This can be explained by the structural properties of the graphs generated by the PA model.…”
Section: Preferential Attachment Modelmentioning
confidence: 94%
“…To provide a more thorough examination of this behavior, we study the robustness index of PA graphs at different scales and for several values of parameter m. Figure 9 depicts the r k value for PA graphs of various sizes (5-350 K nodes) and for a wide range of values for parameter m (m = [2,4,6,8]). We can observe that the PA model fails to qualitatively reproduce the fragility evolution pattern (r k initially increases and after a time point it starts decreasing gradually leading to robust enough graphs).…”
Section: Preferential Attachment Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Zhang et al [17] have identified strong users using their friends' comments. Anagnostopoulos et al [18] have also identified users with high influence among information broadcast by users through social networks.…”
Section: Approaches Based On Users' Behaviormentioning
confidence: 99%
“…Work on this topic encompasses the shrinking diameter and densification [25]; the power law for the mail response times of Einstein and Darwin, [30]; analysis of blog dynamics [16,26], and discovery of core-periphery patterns in blogs and news articles [15]; viral marketing [23,21]; meme tracking [24]; reciprocity analysis [14,6]; analysis of the role of weak and strong ties in information diffusion in mobile networks [31]; identification of important influencers [36]; prediction of service adoption in mobile communication networks [37]; information or cascade diffusion in social networks [9,4,8,38]; linguistic change in online forums, and predicting the user's lifespan based on her linguistic patterns [11]; peer and authority pressure in information propagation [7].…”
Section: Related Workmentioning
confidence: 99%