在线社会网络信任计算与挖掘分析中若干模型与算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着信息技术的飞速发展和互联网的广泛普及,电子邮件、在线购物、在线交友、网上支付、即时通讯等应用已经成为人们工作和生活中不可或缺的一部分。人们在互联网上通过各种关系相互联系在一起,形成了一个个规模庞大、关系复杂以及内容丰富的在线社会网络。面向商业领域的实际应用,目前对在线社会网络的研究面临两大挑战。一是,由于互联网的开放性和匿名性,如何给在线社会网络中的用户提供合理的信任计算机制成为一个亟待解决的问题。二是,在线社会网络作为一个新的商业渠道,面向实际应用,如何对在线社会网络进行挖掘分析从而取得更好的经济效益和社会效益也成为一个备受关注的焦点问题。这两方面直接关系到在线社会网络的安全性和实用性,因此对其研究既具有理论价值又具有实际意义。
     本文正是以在线社会网络的迅猛发展为背景,针对上述两方面开展深入研究,提出了相应的模型和算法。本文的研究内容和主要贡献有以下几个方面:
     ·基于在线社会网络的链式信任模型根据用户可以在社会网络中传递信任消息的特点,本文提出了一个集成信任值和置信值的二维链式信任模型。面向不同的应用场景和用户个性化需求,给出了多种信任计算策略。针对互联网的开放性和匿名性,介绍了链式信任模型的局部存储机制、动态更新机制和信任报告机制。通过在Epinions网站的真实在线社会网络上进行实验,证明了链式信任模型的有效性和灵活性。
     ·基于语义的信任推理
     本文创新性地提出了一种基于语义的信任推理机制。该机制利用语义网技术定义了Epinions领域本体,然后采用OWL/RDF语言对Epinions网站上的数据进行知识表达,并从中抽取出信任相关的信息。根据这些信息,本文制定了基于OWL的信任推理规则。利用这些规则,我们可以推理出用户感兴趣的领域,并从泛化的信任关系推理出领域相关的信任关系,以及根据用户的反馈行为推理出隐式信任关系,从而支持更加准确高效的信任计算。
     ·集成声望、内容和上下文信息的组合信任模型绝大多数现有的信任模型都是基于声望信息的,但是仅仅利用声望信息进行信任计算是远远不够的。因此,本文提出了一个集成声望、内容和上下文信息的组合信任模型——RCCtrust。RCCtrust利用基于语义的信任推理机制从互联网的内容和上下文中抽取出信任相关的信息,并将用户在商品评分和反馈行为上的相似度集成起来刻画用户之间的信任程度,从而构建出一个边权重的组合信任网络来进行信任计算。实验结果表明RCCtrust模型无论是在准确率方面,还是在覆盖率方面,都优于传统协同过滤的单纯相似度方法和仅仅利用信任关系的trust-aware方法。
     ·基于启发式信息的目标团体发现
     本文提出了一个在社会网络中基于启发式信息进行目标团体发现的算法。根据对Epinions网站上的在线社会网络进行分析得出的特征,并结合用户的角色和在线行为,抽取出进行目标团体发现的启发式信息,从而可以有效地简化算法和减小搜索空间。实验结果显示,基于启发式信息的目标团体发现算法能够有效地发现在线社会网络中具有影响力的目标团体,在基于社会网络的市场营销中具有广泛的应用价值。
     ·基于影响力最大化的关键人物挖掘
     传统关键人物挖掘算法往往只考虑了社会网络的结构特点,而忽略了节点之间的相互作用。针对这一不足,本文提出了一个基于影响力最大化的关键人物挖掘算法。面向Epinions网站上的信任网络,利用从互联网的内容和上下文中挖掘出的信息,对用户之间的影响力关系进行建模,并通过求解影响力最大化问题来确定在线社会网络中的关键人物。实验结果表明,本文提出的基于影响力最大化的爬山算法在不同的阈值区间都优于其它几种算法,特别是在激活阈值较大的情况下,爬山算法的优势更为明显。
With the rapid development of information technology and widespread use of Internet, applications such as email,online shopping,online social networking,online payment and instant messaging have become an indispensable part of people's work and life.People ple are connected to each other through a variety of mutual relationships,forming many large,complicated and content-rich online social networks.For practical applications in business,current research of online social networks are facing two major challenges.First, due to the openness and anonymity of the lnternet,how to provide reasonable trust computing mechanism for users in online social networks is an urgent problem to solve.Second, online social network serving as a new business channel,how to conduct mining analysis on online social networks to achieve better economic and social benefits for practical applications also becomes a major concern.These two aspects are directly related to the safety and the utility of online social networks,therefore research about them both have theoretical value and practical significance.
     In the context of rapid development of online social networks,this dissertation conducts in-depth research on the above-mentioned two aspects and proposes some corresponding models and algorithms.The content and main contributions of this dissertation are as follows:
     *Reputation-Chain Trust Model for Online Social Networks
     Since users can propagate trust information in social networks,this dissertation proposes a two-dimensional reputation-chain trust model which integrates trust values and reliable values.According to different application scenarios and users' personalized requirements,some trust calculation strategies are presented.Due to the openness and anonymity of the Internet,this dissertation introduces several mechanisms of reputation-chain trust model such as local storage mechanism,dynamic update mechanism and trust reporting mechanism.The experiment on the real social network of Epinions shows the flexibility and efficiency of reputation-chain trust model.
     *Semantic-based Trust Reasoning
     This dissertation proposes an innovative semantic-based trust reasoning mechanism. This mechanism exploits the Semantic Web technology to define Epinions domain ontology,then makes use of OWL/RDF language for knowledge representation of Epinions data,and extracts trust-related information from the data.Based on these information,this dissertation defines OWL-based trust reasoning rules.Using these rules,we manage to reason about users' interested categories,and infer from overgeneralized trust relationships to category-specific trust relationships,and discover implicit trust relationships between users according to their feedback behavior,thus supporting more accurate and efficient trust calculation.
     *A Reputation-,Content- and Context-based Combined Trust Model
     Most existing trust models are based on reputation information,however,only utilizing reputation information for trust computing is far from sufficient.Therefore,this dissertation innovatively puts forward a combined trust model-RCCtrust which integrates reputation,content and context information.RCCtrust utilizes semanticbased trust reasoning mechanism to extract trust-related information from the content and context of the Internet,and integrates users' similarity in product ratings and feedback behavior to depict the trust degree between pairs of users,thus constructing a edge-weighted combined trust network for trust computing.The experimental results show that RCCtrust model outperforms pure similarity method of traditional collaborative filtering and trust-aware method only utilizing trust relationships both in accuracy and coverage.
     *Heuristic Information-based Targeted Group Discovery
     This dissertation proposes a targeted group discovery algorithm based on heuristic information in social networks.According to the features obtained from the analysis of Epinions online social network,combining with users roles and online behavior, we can extract heuristic information for targeted group discovery,thus effectively simplify the algorithm and reduce search space.The experimental results show that the heuristic information-based targeted group discover algorithm manages to efficiently locate influential targeted groups in the online social network and has a widespread application value in social network-based marketing.
     * Influence Maximization-based Key Persons Mining
     Traditional methods of mining key persons only considered the structural characteristics of social networks,but neglected the interactions between nodes.Concerning the above disadvantage,this dissertation proposes an influence maximization-based key persons mining algorithm.For the trust network on Epinions,this dissertation utilizes the extracted information from the content and context of Internet,models the influence relationships between users,and identifies key persons in the online social network by solving the influence maximization problem.The experimental results show that our proposed influence maximization-based hill-climbing algorithm outperforms the other methods in different ranges of activation threshold.The advantage of hill-climbing algorithm becomes more prominent especially when the activation threshold is large.
引文
[1]Myspace.http://www.myspace.com/.
    [2]Facebook.http://www.facebook.com.
    [3]肖明华.社会性网络的营销价值探讨[J].职业圈,2007.(14).
    [4]Epinions.http://www.epinions.com/.
    [5]orkut,http://www.orkut.com/.
    [6]Flickr.http://www.flickr.com/.
    [7]人立方关系搜索.http://renlifang.msra.cn/.
    [8]Yahoo! answers,http://answers.yahoo.com/.
    [9]Youtube.http://www.youtube.com/.
    [10]MILGRAM S.The small world problem[J].Psychology Today,1967,60-67.
    [11]HILTZ S R,TUROFF M.Network Nation[M].Addison-Wesley,1979.
    [12]Usenet.http://en.wikipedia.org/wiki/Usenet.
    [13]Arpanet.http://en.wikipedia.org/wiki/ARPANET.
    [14]Listserv.http://en.wikipedia.org/wiki/LISTSERV.
    [15]Classmates.com.http://en.wikipedia.org/wiki/Classmates.com.
    [16]Sixdegrees.com.http://en.wikipedia.org/wiki/SixDegrees.com.
    [17]ROSEN C,Virtual friendship and the new narcissism[J].The New Atlantis,2007,(17):15-31.
    [18]Friendster.http://www.friendster.com/.
    [19]Bebo.http://www.bebo.com/.
    [20]FRANCIA R.Facebook overtakes myspace in web traffic.http://tech.blorge.com/.
    [21]报告称facebook全球用户量接近myspace两倍.http://news.pconline.com.cn/nw/0901/1549897.html.
    [22]Yahoo! 360°.http://360.yahoo.com/.
    [23]校内网.http://channel.xiaonei.com/.
    [24]mixi.http://mixi.jp/.
    [25]Cyworld.http://www.cyworld.com/.
    [26]Stanford biog.http://www.stanfordblog.com/.
    [27]Linkedin.http://www.linkedin.com/.
    [28]Msn space,http://home.spaces.live.com.
    [29]del.icio.us,http://delicious.com/.
    [30]ZHANG J,ACKERMAN M S,ADAMIC L.Expertise networks in online communities:Structure and algorithms[C]//Proceedings of the 16th International World Wide Web Conference.2007.
    [31]Sun forum,http://forums.sun.com/index.jspa.
    [32]Yahoo! answers,http://answers.yahoo.com/.
    [33]百度知道.http://zhidao.baidu.com/.
    [34]Icq.http://www.icq.com/.
    [35]Msn messenger,http://messenger.live.com/.
    [36]Yahoo! messenger,http://messenger.yahoo.com/.
    [37]I'm qq.http://im.qq.com/.
    [38]Google talk.http://www.google.com/talk/.
    [39]Skype.http://im.skype.com/.
    [40]LESKOVEC J,HORVITZ E.Planetary-scale views on a large instant-messaging network[C]//Proceedings of the 17th International Conference on World Wide Web.2008:915-924.
    [41]段志生.图论与复杂网络[J].力学进展,2008,38.
    [42]WATTS D J,STROGATZ S H.Collective dynamics of 'small-world' networks[J].Nature,1998,393:440-442.
    [43]JADBABAIE A,LIN J,MORSE A S.Coordination of groups of mobile autonomous agents using nearest neighbor rules[J].IEEE Transactions on Automatic Control,2003,48:988-1001.
    [44]MATSUDA T,HORIUCHI T,HIROSHI MOTODA T W.Extension of graph-based induction for general graph structured data[C]//The 4th Pacific-Asia Conference on Knowledge Discovery and Data Mining.2000:420-431.
    [45]BLOGGER DON.Web2.0概念诠释.
    [46]BERNERS-LEE T,HENDLER J,LASSILA O.The semantic web[J].Scientific American,2001.
    [47]Owl overview,http://www.w3.org/TR/owl-features/.
    [48]GRUBER T R.A translation approach to portable ontology specifications[J].Knowledge Acquisition,1993,5:199-220.
    [49]Rdf primer.http://www.w3.org/TR/rdf-primer/.
    [50]Resource description framework(rdf) schema specification 1.0.http://www.w3.org/TR/2000/CR-rdf-schema-20000327/.
    [51]HAN J,KAMBER M.Data Mining:Concepts and Techniques[M].Morgan Kaufmann,2001.
    [52]GETOOR L,DIEHL C P.Link mining:A survey[J].ACM SIGKDD Explorations Newsletter,2005,7:3-12.
    [53]GIRVAN M,NEWMAN M.Community structure in social and biological networks [C]//National Academic Science.vol 99.2002:7821-7826.
    [54]XU J J,CHEN H.Crimenet explorer:A framework for criminal network knowledge discovery[J].ACM Transactions on Information Systems,2005,23(2):201-226.
    [55] ZHOU D, MANAVOGLU E, LI J, et al. Probabilistic models for discovering e- coramunities[C]// Proceedings of the 15th International World Wide Web Conference. 2006.
    
    [56] ZHANG Y, WU Z, CHEN H, et al. Mining target marketing groups from users' web of trust on epinions[C]// 2008 AAAI Spring Symposium. 2008.
    
    [57] KEMPE D, KLEINBERG J, TARDOS E. Maximizing the spread of influence through a social network[C]// Proceeding of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2003.
    
    [58] KEMPE D, KLEINBERG J, TARDOS E. Influential nodes in a diffusion model for social networks[C]// Proceedings of the 32nd International Colloquium on Automata, Languages and Programming. 2005: 1127-1138.
    
    [59] RICHARDSON M, DOMINGOS P. Mining knowledge-sharing sites for viral mar- keting[C]// The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2002.
    
    [60] RICHARDSON M, DOMINGOS P. Mining the network value of customers[C]// Proceedings of the Seventh International Conference on Knowledge Discovery and Data Mining. 2001.
    
    [61] JAVA A, KOLARI P, FTNIN T, et al. Modeling the spread of influence on the bl-ogosphere[C]// Proceeding of the 15th International World Wide Web Conference.2006.
    
    [62] HILL S, PROVOST F, VOLINSKY C. Network-based marketing: Identifying likely adopters via consumer networks[J]. Statistical Science, 2006,21(2):256-276.
    
    [63] LESKOVEC J, BACKSTROM L, KUMAR R, et al. Microscopic evolution of social networks[C]// The 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2008:462-470.
    
    [64] CRANDALL D, COSLEY D, HUTTENLOCHER D, et al. Feedback effects between similarity and social influence in online communities[C]// The 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2008: 160-168.
    
    [65] BACKSTROM L, HUTTENLOCHER D, KLEINBERG J, et al. Group formation in large social networks: Membership, growth, and evolution[C]// The 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2008: 44-54.
    
    [66] KOSSINETS G, KLEINBERG J, WATTS D. The structure of information pathways in social communication networks[C]// The 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2008:435-443.
    
    [67] D.KAMVAR S, T.SCHLOSSER M, GARCIA-MOLINA H. The eigentrust algorithm for reputation management in p2p networks[C]// Proceedings of the Twelfth International World Wide Web Conference. Budapest, Hungary: 2003.
    
    [68] GOLBECK J, PARSIA B, HENDLER J. Trust networks on the semantic web[C]// Proceedings of Cooperative Intelligent Agents. 2003.
    
    [69] XIONG L, LIU L. Peertrust: Supporting reputation-based trust for peer-to-peerelectronic communities[J]. IEEE Transactions on Knowledge and Data Engineering, 2004,16:843-857.
    
    [70] O' HARA K, ALANI H, KALFOGLOU Y, et al. Trust strategies for the semantic web[C]// Workshop on Trust, Security, and Reputation on the Semantic Web at ISWC2004. Hiroshima, Japan: 2004.
    
    [71] HUYNH D, JENNINGS N R, SHADBOLT N R. Developing an integrated trust and reputation model for open multi-agent systems[C]// Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multi-agent Systems. 2004.
    
    [72] WANG Y, VASSILEVA J. Bayesian network-based trust model[C]// Proceedings of the IEEE/WIC International Conference on Web Intelligence. 2003.
    
    [73] ZHOU R, HWANG K, CAI M. Gossiptrust for fast reputation aggregation in peer- to-peer networks[J]. IEEE Transactions on Knowledge and Data Engineering, 2008, 20:1282-1295.
    [74] BONATTI P, SAMARATI P. Regulating service access and information release on the web[C]// The 7th ACM conference on computer and communications security. 2000: 134-143.
    
    [75] GAVRILOAIE R, NEJDL W, OLMEDILLA D, et al. No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web[C]// The 1st European Semantic Web Symposium. 2004: 342-356.
    
    [76] BLAZE M, FEIGENBAUM J, LACY J. The policymaker approach to trust man- agement[C]// DIMACS Workshop on Trust Management in Networks. 1996.
    
    [77] NEJDL W, OLMEDILLA D, WINSLETT M. Peertrust: Automated trust negotiation for peers on the semantic web[C]// Workshop on Secure Data Management in a Connected World. 2004: 118-132.
    
    [78] Protune. http://www.13s.de/web/protune.
    
    [79] BONATTI P. OLMEDILLA D. Driving and monitoring provisional trust negotiation with metapolicies[C]// The 6th International Workshop on Policies for Distributed Systems and Networks. 2005: 14-23.
    
    [80] CHU Y H, FEIGENBAUM J, LAMACCHIA B. et al. Referee: Trust management for web applications[J]. World Wide Web Journal, 1997,2:127-139.
    
    [81] Advogato's trust metric. http://www.advogato.org/trust-metric.html.
    
    [82] ebay.com. http://www.ebay.com.
    
    [83] Amazon.com. http://www.amazon.com.
    
    [84] RICHARDSON M, AGRAWAL R, DOMINGOS P. Trust management for the semantic web[C]// Proceedings of the Second International Semantic Web Conference. 2003: 351-368.
    
    [85] YU B, SINGH M P. An evidential model of distributed reputation management[C]// The 1st International Joint Conference on Autonomous Agents and Multiagent Systems. ACM Press 2002: 294-301.
    [86]MARSH S P.Formalising Trust as a Computational Concept[D].PhD thesis.University of Stirling,1994.
    [87]ABDUL-RAHMAN A,HAILES S.Supporting trust in virtual communities[C]//Proceedings of the Hawai'i International Conference on System Sciences.Maui,Hawaii:2000.
    [88]SABATER J,SIERRA C.Reputation and social network analysis in multi-agent systems[C]//The First International Joint Conference on Autonomous Agents and Multiagent Systems.2002:475-482.
    [89]李景涛,荆一楠,肖晓春等.基于相似度加权推荐的p2p环境下的信任模型[J].软件学报,2007,18:157-167.
    [90]GOLBECK J,HENDLER J.Accuracy of metrics for inferring trust reputation in semantic web-based social networks[C]//International Conference on Knowledge Engineering and knowledge Management.2004:116-131.
    [91]SONG S,HWANG K,ZHOU R,et al.Trusted p2p transactions with fuzzy reputation aggregation[J].IEEE Internet Computing,2005,9:24-34.
    [92]ZIEGLER C N,GOLBECK J.Investigating interactions of trust and interest similarity [J].Decision Support Systems,2007,43:460-475.
    [93]HO T H,WEIGELT K.Trust among strangers[C]//Experimental Social Science Laboratory(Xlab).2004.http://repositories.cdlib.org/iber/xlab/XL05-001/.
    [94]RUTTER J.From the sociology of trust towards a sociology of 'e-trust'[J].International Journal of New Product Development & Innovation Management,2001.
    [95]MAYER R C,DAVIS J H,SCHOORMAN D F.An integrative model of organizational trust[J].The Academy of Management Review,1995,20(3):709-734.
    [96]GURTMAN M.Trust,distrust,and interpersonal problems:A circumplex analysis [J].Journal of Personality and Social Psychology,1992,62:989-1002.
    [97]FUKUYAMA F.Trust:The Social Virtues and the Creation of Prosperity[M].The Free Press,1995.
    [98] KOLLOCK P. The emergence of exchange structures: An experimental study of uncertainty, commitment, and trust[J]. American Journal of Sociology, 1994, 100(2):313-345.
    
    [99] CAVERLEE J, LIU L, WEBB S. Towards robust trust establishment in web-based social networks with socialtrustfC]// The 17th International Conference on World Wide Web. 2008: 1163-1164.
    
    [100] KATZ Y, GOLBECK J. Social network-based trust in prioritized default logic[C]// The 21st National Conference on Artificial Intelligence. 2006: 1345-1350.
    
    [101] GOLBECK J, HENDLER J. Inferring trust relationships in web-based social net- works[J]. ACM Transactions on Internet Technology, 2006,6(4):497-529.
    
    [102] WALTER F E, BATTISTON S, SCHWEITZER F. A model of a trust-based recommendation system on a social network[JJ. Autonomous Agents and Multi-agent Systems, 2008,16:57-74.
    
    [103] The foaf project, http://www.foaf-project.org/.
    
    [104] GOLBECK J, HENDLER J. Filmtrust: Movie recommendations using trust in web-based social networks[C]// IEEE Consumer Communications and Networking Conference. 2006: 282-286.
    
    [105] GOLBECK J. Generating predictive movie recommendations from trust in social networks[C]// The Fourth International Conference on Trust Management. Pisa, Italy: 2006.
    
    [106] Bibserv.org. http://www.bibserv.org/.
    
    [107] SHARDANAND U, MAES P. Social information filtering: Algorithms for automating "word of mouth"[C]// Conference on Human Factors in Computing Systems. 1995:210-217.
    
    [108] KAUTZ H A, SELMAN B, SHAH M. Referralweb: Combining social networks and collaborative filtering[C]// Communications of the ACM. vol 40. 1997: 63-66.
    [109]MATTHEWS B,DIMITRAKOS T.Deploying trust policies on the semantic web[C]//The Second International Conference on Trust Management.2004:369-375.
    [110]BERNERS-LEE T.Semantic web road map.http://www.w3.org/DesignIssues/Semantic.html.
    [111]BERNERS-LEE T.Semantic web.http://www.w3.org/2000/Talks/1206-xml2k-tbl/.
    [112]ANTONIOU G,VAN HARMELEN F.A Semantic Web Primer[M].The MIT Press,2004.
    [113]PALMER S B.The semantic web:An introduction.http://infomesh.net/2001/swintro/2001.
    [114]DING L,ZHOU L,FININ T.Trust based knowledge outsourcing for semantic web agents[C]//International Conference on Web Intelligence.2003:379-387.
    [115]ZHANG Y,CHEN H,WU Z,et al.Develop a computational trust prototype for the semantic web[C]//Proceedings of the 22nd International Conference on Data Engineering Workshop.2006.
    [116]LI DING A P K,FININ T,JOSHI A,et al.On homeland security and the semantic web:a provenance and trust aware inference framework[C]//AAAI Spring Symposium on AI Technologies for Homeland Security.2005.
    [117]HEYMANS S,NIEUWENBORGH D V,VERMEIR D.Preferential reasoning on a web of trust[C]//Proceedings of the fourth International Semantic Web Conference.2005:368-382.
    [118]张宇,陈华钧,姜晓红等.电子商务系统信任管理研究综述[J].电子学报,2008.36(10):2011-2020.
    [119]FORD P.August 2009:How google beat amazon and ebay to the semantic web.http://ftrain.com/google_takes_all.html 2002.
    [120] FISHER D, SMITH M, WELSER H T. You are who you talk to: Detecting roles in usenet newsgroups[C]// The 39th Hawai'i International Conference on System Sciences. 2006.
    
    [121] BOLLEN J, DE SOMPEL H V, SMITH J A, et al. Toward alternative metrics of journal impact: A comparison of download and citation data[J]. Information Processing & Management. 2005,41(6):1419-1440.
    
    [122] LIU X, BOLLEN J, NELSON M L, et al. Co-authorship networks in the digital library research community[J]. Electronic Commerce Research and Applications, 2005,41:1462-1480.
    
    [123] PAGE L, SERGEY BRIN R M, WINOGRAD T. The pagerank citation ranking: Bring order to the web[R]. Stanford University, 1998. [124] KLE1NBERG J M. Hubs, authorities, and communities[J]. ACM Computing Surveys, 1999,31.
    
    [125] O'MADADHAIN J, HUTCHINS J, SMYTH P. Prediction and ranking algorithms for event-based network data[J]. ACM SIGKDD Explorations Newsletter, 2005, 7.
    
    [126] LU Q, GETOOR L. Link-based text classification[C]// IJCAI Workshop on Text- mining & Link-analysis. 2003.
    
    [127] CHAKRABARTI S, DOM B, INDYK P. Enhanced hypertext categorization using hyperlinks[C]// ACM SIGMOD International Conference on Management of Data. 1998: 307-318.
    
    [128] DEAN J, HENZINGER M R. Finding related pages in the world wide web[C]//The Eighth International World Wide Web Conference. 1999: 53-72.
    
    [ 129] CRAVEN M, SLATTERY S. Combining statistical and relational methods for learning in hypertext domains[C]// The 8th International Conference on Inductive Logic Programming. 1998: 38-52.
    
    [130] FREEMAN L C. Centrality in social networks: Conceptual clarification[J]. Social Networks, 1979, 1(3):215-239.
    [131]BAKER W E,FAULKNER R R.The social organization of conspiracy:Illegal networks in the heavy electrical equipment industry[J].American Sociological Review,1993,58(6):837-860.
    [132]EVERETT M,BORGATTI S.The centrality of groups and classes[J].Journal of Mathematical Sociology,1999,23(3):181-201.
    [133]NEWMAN M E J.Who is the best connected scientist? a study of scientific coauthorship networks[J].Physical Review E,2001,64:337-370.
    [134]温粉莲,唐常杰,乔少杰等.基于社会网络最短路径挖掘犯罪集团核心[J].计算机科学,2006,33(11).
    [135]SIBSON R.Slink:An optimally efficient algorithm for the single-link cluster method[J].The Computer Journal,1973,16:30-34.
    [136]SNEATH P H.The application of computers to taxonomy[J].Journal of general microbiology,1957,17:201-226.
    [137]DEFAYS D.An efficient algorithm for a complete link method[J].The Computer Journal,1977,20:364-366.
    [138]KING B.Step-wise clustering procedures[J].Journal of the American Statistical Association,1967,62:86-101.
    [139]JAIN A,MURTY M,FLYNN P.Data clustering:A review[J].ACM Computing Surveys,1999,31(3):264-323.
    [140]MACQUEEN J B.Some methods for classification and analysis of multivariate observations [C]//The 5th Berkeley Symposium on Mathematical Statistics and Probability.1967:281-297.
    [141]ZAHN C.Graph-theoretical methods for detecting and describing gestalt clusters[J].IEEE Transactions on Computers,1971,C-20:68-86.
    [142]GIRVAN M,NEWMAN M E J.Community structure in social and biological networks [J].Proceedings of the National Academy of Sciences,2002,99(12):7821-7826.
    [143] NEWMAN M E J. Detecting community structure in networks[J]. European Physical Journal B, 2004,38(2):321-330.
    
    [144] TYLER J R, WILKINSON D M, HUBERMAN B A. Email as spectroscopy: Automated discovery of community structure within organizations[C]//. 2003.
    
    [145] KOSALA R, BLOCKEEL H. Web mining research: A survey[J]. SIGKDD Explorations, 2000, 2:1-15.
    
    [146] CHAKRABARTI S. Mining the Web: Discovering Knowledge from Hypertext Data[M]. lstthed. Morgan-Kaufmann, 2002.
    
    [147] DZEROSKI S, LAVRAC N. Relational Data Mining[M]. Springer, 2001.
    
    [148] DZEROSKI S, LAVRAC N. Multi-Relational Data Mining[M]. IOS Press, 2006.
    
    [149] CHAKRABARTI S, DOM B, INDYK P. Artificial intelligence and link analysis[C]// AAAI Fall Symposium. 1998.
    
    [150] FELDMAN R. Link analysis: Current state of the art. http://dydan.rutgers.edu/Seminars/Slides/feldman.ppt 2002.
    
    [151] CHAKRABARTI D, FALOUTSOS C. Graph mining: Laws, generators, and algo-rithms[J]. ACM Computing Surveys, 2006, 38.
    
    [152] Evidence extraction and link discovery. http://w2.eff.org/Privacy/TIA/eeld.php 2002.
    
    [153] MOONEY R J, MELVILLE P. SHAVLIK J, et al. Relational data mining with inductive logic programming for link discovery[C]// National Science Foundation Workshop on Next Generation Data Mining. 2002.
    
    [154] SHOU-DE L, H C. Unsupervised link discovery in multi-relational data via rarity analysis[C]// The Third IEEE International Conference on Data Mining. 2003:747- 752.
    
    [155] KOVALERCHUK B, VITYAEV E. Correlation of complex evidences and link dis- covery[C]// The Fifth International Conference on Forensic Statistics. 2002.
    [156] ZHANG Z, SALERNO J J, YU P S. Applying data mining in investigating money laundering crimes[C]// The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2003: 747-752.
    
    [157] NICHOLAS PIOCH A D H, FOURNELLE C, WASHBUM B, et al. Cadre: Continuous analysis and discovery from relational evidence[C]// KIMAS. 2003.
    
    [158] INGWERSEN P. The calculation of web impact factors [J]. Journal of Documentation, 1998, 54(2):236-243.
    
    [159] BECCHETTI L, CASTILLO C, DONATO D, et al. Using rank propagation and probabilistic counting for link-based spam detection[C]// KDD Workshop on Web Mining and Web Usage Analysis. 2006.
    
    [160] Netmap analytics. http://www.netmap.com.au/.
    
    [161] Fraud investigation. http://www.ebrinc.com/files/EBR_fraud_investigation.pdf.
    
    [162] THELWALL M, WILKINSON D. Finding similar academic web sites with links, bibliometric couplings and colinks[J]. Information Processing and Management, 2004,40:515-526.
    
    [163] VAUGHAN L, YOU J. Comparing business competition positions based on web co-link data: The global market vs. the Chinese market[J]. Scientometrics, 2006, 68(3):611-628.
    
    [164] XU J, CHEN H. Criminal network analysis and visualization[J]. Communications of the ACM, 2005,48(6).
    
    [165] Link analysis workbench [R].
    
    [166] CRAVEN M, DIPASQUO D, FREITAG D, et al. Learning to construct knowledge bases from the world wide web[J]. Artificial Intelligence, 2000,118:69-113.
    
    [167] POPESCUL A, UNGAR L H. Statistical relational learning for link prediction[C]// IJCAI2003 Workshop on Learning Statistical Models from Relational Data. 2003.
    
    [168] ADAFRE S F, DE RIJKE M. Discovering missing links in wikipedia[C]// The 3rd International Workshop on Link discovery. 2005: 90-97.
    [169] HUANG Z, LIN D K. The time series link prediction problem with applications in communication surveillance[J]. INFORMS Journal on Computing, 2008.
    
    [170] LIBEN-NOWELL D, KLEINBERG J. The link prediction problem for social net- works[C]// Proceedings of the Twelfth International Conference on Information and Knowledge Management. 2003:556-559.
    
    [171] POPESCUL R, UNGAR L H. Statistical relational learning for link prediction[C]// IJCAI Workshop on Learning Statistical Models from Relational Data. 2003: 556-559.
    
    [172] O'MADADHAIN J, HUTCHINS J, SMYTH P. Prediction and ranking algorithms for even-based network data[J]. SIGKDD Explorations, 2005.7:23-30.
    
    [173] HASAN M A, CHAOJI V, SALEM S, et al. Link prediction using supervised learn-ing[C]// The Fourth Workshop on Link Analysis, Counterterrorism and Security. 2006.
    
    [174] INOKUCHI A, WASHIO T. MOTODA H. An apriori-based algorithm for mining frequent substructures from graph data[C]// The Fourth European Conference on Principles and Practice of Knowledge Discovery in Databases. 2000: 13-23.
    
    [175] KURAMOCHI M, KARYPIS G. Frequent subgraph discovery[C]//The 2001 IEEE International Conference on Data Mining. 2001: 313-320.
    
    [176] YAN X, HAN J. gspan: Graph-based substructure pattern mining[C]// The 2002 IEEE International Conference on Data Mining. 2002: 721-724.
    
    [177] YAN X, HAN J. Closegraph: Mining closed frequent graph patterns[C]// The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2003: 286-295.
    
    [178] HUAN J, WANG W, PRINS J. Efficient mining of frequent subgraphs in the presence of isomorphism[C]// 2003 IEEE International Conference on Data Mining. 2003: 286-295.
    [179] COOK D J, HOLDER L B. Substructure discovery using minimum description length and background knowledge[J]. Journal of Artificial Intelligence Research, 1994,1:231-255.
    
    [180] KING R D, MUGGLETONT S H, SRINIVASANI A, et al. Structure-activity relationships derived by machine learning: The use of atoms and their bond connectivities to predict mutagenicity by inductive logic programming[J]. National Academy of Sciences, 1996, 93(1):438-442.
    
    [181] GARTNER T. Exponential and geometric kernels for graphs[C]// NIPS Workshop on Unreal Data: Principles of Modeling Nonvectorial Data. 2002.
    
    [ 182] KASHIMA H, INOKUCHI A. Kernels for graph classification[C]// In ICDM Workshop on Active Mining. 2002.
    
    [183] Edelman trust barometer. http://www.edelman.co.uk/trustbarometer/2007.
    
    [184] GUHA R, KUMAR R, RAGHAVAN P, et al. Propagation of trust and distrust[C]// Proceedings of the 13th Internationa] Conference on World Wide Web. 2004.
    
    [185] ZHANG Y, CHEN H, WU Z, et al. A reputation-chain trust model for the semantic web[C]// The Proceedings of the 20th International Conference on Advanced Information Networking and Applications. 2006: 719-723.
    
    [186] taobao.com. www.taobao.com.
    
    [187] HU M, LIU B. Mining opinion features in customer reviews[C]// The Nineteenth National Conference on Artificial Intelligence. 2004.
    
    [188] Nlprocessor-text analysis toolkit. http://www.infogistics.com/textanalysis.html.
    
    [189] MIKROYANNIDIS A. Toward a social semantic web[J]. Computer, 2007,40:113-115.
    
    [190] Qualified cardinality restrictions (qcrs): constraing the number of property values of a particular type. http://www.cs.vu.nl/ guus/public/qcr.html 2004.
    [191] Representing specified values in owl: "value partitions" and "value sets". http://www.w3.org/2001/sw/BestPractices/OEP/Lists-of-values-20040625/2004.
    
    [192] YU B, SINGH M P. A social mechanism of reputation management in electronic communities[C]// The Proceedings of Fourth International Workshop on Cooperative Information Agents. 2000.
    
    [193] ZHANG Y, CHEN H, X1A C, et al. Building trust in electronic communities by mining web content[J]. International Journal of Computational Science and Engineering, in print, 2009.
    
    [194] MASS A P, AVESANI P. Trust-aware collaborative filtering for recommender sys-tems[C]// Proceeding of Federated International Conference On The Move to Meaningful Internet: CoopIS, DOA,ODBASE. 2004.
    
    [195] BIZER C, OLDAKOWSKI R. Using context- and content-based trust policies on the semantic web[C]// Proceedings of the 13th International Conference on World Wide Web. 2004.
    
    [196] ZHANG Y, CHEN H, JIANG X, et al. Content-based trust mechanism for e- commerce systems[C]// Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference. 2008: 1181-1186.
    
    [197] RICHARD BELLMAN M G. On the analytic formalism of the theory of fuzzy sets[J]. Information Sciences, 1973,149-156.
    
    [198] CHA M, MISLOVE A, GUMMADI K P. A measurement-driven analysis of information propagation in the flickr social network[C]// The 18th International Conference on World Wide Web. 2009: 721-730.
    
    [199] ADAMIC L A. The small world web[C]//Proc. of ECDL. 1999:443-452.
    
    [200] Pajek: Program for large network analysis. http://vlado.fmf.uni-lj.si/pub/networks/pajek/default.htm.
    
    [201] Pareto's principle-the 80-20 rule.
    
    http://management.about.com/cs/generalmanagement/a/Pareto081202.htm.
    [202]PAUMGARTEN N.No.1 fan dept.acknowledged[J].The New Yorker,2003.
    [203]JUSSIM L,OSGOOD D.Influence and similarity among friends:An integrative model applied to incarcerated adolescents[J].Social Psychology Quarterly,1989,52(2):98-112.
    [204]DELOITTE.New deloitte study shows inflection point for consumer products industry:companies must learn to compete in a more transparent age.http://usstock.jrj.com.cn/news/2007-10-01/000002746415.html 2007.
    [205]GRANOVETTER M.Threshold models of collective behavior[J].American Journal of Sociology,1978,83:1420-1443.
    [206]MACY M W.Chains of cooperation:Threshold effects in collective action[J].American Sociological Review,1991,56(6):730-747.
    [207]VALENTE T W.Social networks and threshold models of collective behavior[J].Social Networks,1996,18:69-89.
    [208]MACY M W,WILLER R.From factors to actors:Computational sociology and agent-based modeling[J].Annual Review of Sociology,2002,28:143-166.
    [209]Trustlet.http://www.trustlet.org/wiki/Epinions_dataset.
    [210]中国网民数量达到2.53亿.http://news.xinhuanet.com/newscenter/2008-09/23/content_10097489.htm.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700