2017
DOI: 10.1007/978-3-319-60033-8_73
|View full text |Cite
|
Sign up to set email alerts
|

Structural Holes Theory-Based Influence Maximization in Social Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…It should be noted that the circle not only expresses the information of cited frequency, but also conveys other information. Nodes with purple circles are nodes with centrality greater than 0.1, which means that this document is important in the co-cited network, and this article probably acts as Structural Hole ( Zhu et al, 2017 ). Structural Hole plays an important role in information dissemination, which has a better position in social networks to expand the scope of information dissemination ( Gong et al, 2020b ).…”
Section: Content Analysismentioning
confidence: 99%
“…It should be noted that the circle not only expresses the information of cited frequency, but also conveys other information. Nodes with purple circles are nodes with centrality greater than 0.1, which means that this document is important in the co-cited network, and this article probably acts as Structural Hole ( Zhu et al, 2017 ). Structural Hole plays an important role in information dissemination, which has a better position in social networks to expand the scope of information dissemination ( Gong et al, 2020b ).…”
Section: Content Analysismentioning
confidence: 99%
“…Since structural hole spanners in social networks could produce influences to users located in multiple communities, only using social influences of structural hole spanners for users in one community could not exactly approximate their social influences in the whole network. Existed studies have proposed to utilize structural holes for solving the influence maximization problem and finding influential users (Xiaoping & Yurong, 2015; Zhu, Liu, & Yin, 2017; Zhu, Yin, et al, 2017). These researches compute structural hole values for all structural hole spanners and combine these values into the traditional greedy‐based influence maximization algorithm.…”
Section: Introductionmentioning
confidence: 99%