Computer Science ›› 2019, Vol. 46 ›› Issue (2): 315-320.doi: 10.11896/j.issn.1002-137X.2019.02.048
• Interdiscipline & Frontier • Previous Articles Next Articles
JIN Ting1, TAN Wen-an1,2, SUN Yong1, ZHAO Yao1
CLC Number:
[1]LAPPAS T,LIU K,TERZI E.Finding a team of experts in social networks[C]∥Proceedings of the 15th ACM SIGKDD International Conf. on Knowledge Discovery and Data Mining.New York:ACM,2009:467-476. [2]LI C T,SHAN M K.Team formation for generalized tasks in expertise social networks[C]∥Proceedings of IEEE International Conference on Social Computing.Piscataway,NJ:IEEE,2010:9-16. [3]KARGAR M,AN A.Discovering top-k teams of experts with/without a leader in social networks[C]∥Proceedings of the 20th ACM International Conference on Information and Knowledge Management.New York:ACM,2011:985-994. [4]KARGAR M,ZIHAYAT M,AN A.Finding affordable and collaborative teams from a network of experts[C]∥Proceedings of the 13th SIAM International Conference on Data Mining.2013:587-595. [5]KARGAR M,AN A,ZIHAYAT M.Efficient Bi-objective Team Formation in Social Networks[C]∥Proceedings of 2012 European Conference on Machine Learning & Knowledge Discovery in Databases.Berlin:Springer-Verlag,2012:483-498. [6]SUN Y,TAN W A,LI L,et al.A new method to identify colla- borative partners in social service provider networks[J].Information Systems Frontiers,2016,18(3):565-578. [7]SUN Y,TAN W A.Cross-Organizational Workflow Task Allocation Algorithms for Socially Aware Collaborative Computing[J].Journal of Computer Research and Development,2017,54(9):1865-1879.(in Chinese) 孙勇,谭文安.支持社会协同计算的跨组织工作流任务分派算法[J].计算机研究与发展,2017,54(9):1865-1879. [8]SUN H L,JIN M Y,LIU J L,et al.Methods for Team Formation Problem with Grouping Task in Social Networks[J].Journal of Computer Research and Development,2015,52(11):2535-2544.(in Chinese) 孙焕良,金洺宇,刘俊岭,等.社会网络上支持任务分组的团队形成方法[J].计算机研究与发展,2015,52(11):2535-2544. [9]FARHADI F,SORKHI M,HASHEMI S,et al.An effective expert team formation in social networks based on skill grading[C]∥Proceedings of 2011 IEEE 11th International Conference on Data Mining Workshops (ICDMW).New York:IEEE,2011:366-372. [10]SUN H L,FU S S,LIU J L,et.al.Team Formation with Weak Ties in Social Networks[J].Journal of Frontiers of Computer Science and Technology,2016,10(6):773-785.(in Chinese) 孙焕良,富珊珊,刘俊岭,等.社会网络中弱关系团队形成问题研究[J].计算机科学与探索,2016,10(6):773-785. [11]XIE C W,WANG Z J,XIA X W.Multi-Objective Evolutionary Algorithm Based on Archive-Elite Learning and Opposition-Based Learning[J].Chinese Journal of Computers,2017,40(3):757-772.(in Chinese) 谢承旺,王志杰,夏学文.应用档案精英学习和反向学习的多目标进化算法[J].计算机学报,2017,40(3):757-772. [12]BAYKASOGLU A,DERELI T,DAS S.Project team selection using fuzzy optimization approach[J].Cybernetics and Systems,2007,38(2):155-185. |
[1] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[2] | SUN Gang, WU Jiang-jiang, CHEN Hao, LI Jun, XU Shi-yuan. Hidden Preference-based Multi-objective Evolutionary Algorithm Based on Chebyshev Distance [J]. Computer Science, 2022, 49(6): 297-304. |
[3] | WEI Peng, MA Yu-liang, YUAN Ye, WU An-biao. Study on Temporal Influence Maximization Driven by User Behavior [J]. Computer Science, 2022, 49(6): 119-126. |
[4] | YU Ai-xin, FENG Xiu-fang, SUN Jing-yu. Social Trust Recommendation Algorithm Combining Item Similarity [J]. Computer Science, 2022, 49(5): 144-151. |
[5] | CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66. |
[6] | ZUO Yuan-lin, GONG Yue-jiao, CHEN Wei-neng. Budget-aware Influence Maximization in Social Networks [J]. Computer Science, 2022, 49(4): 100-109. |
[7] | GUO Lei, MA Ting-huai. Friend Closeness Based User Matching [J]. Computer Science, 2022, 49(3): 113-120. |
[8] | SHAO Yu, CHEN Ling, LIU Wei. Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model [J]. Computer Science, 2022, 49(2): 204-215. |
[9] | WANG Jian, WANG Yu-cui, HUANG Meng-jie. False Information in Social Networks:Definition,Detection and Control [J]. Computer Science, 2021, 48(8): 263-277. |
[10] | TAN Qi, ZHANG Feng-li, WANG Ting, WANG Rui-jin, ZHOU Shi-jie. Social Network User Influence Evaluation Algorithm Integrating Structure Centrality [J]. Computer Science, 2021, 48(7): 124-129. |
[11] | ZHANG Ren-zhi, ZHU Yan. Malicious User Detection Method for Social Network Based on Active Learning [J]. Computer Science, 2021, 48(6): 332-337. |
[12] | BAO Zhi-qiang, CHEN Wei-dong. Rumor Source Detection in Social Networks via Maximum-a-Posteriori Estimation [J]. Computer Science, 2021, 48(4): 243-248. |
[13] | ZHANG Shao-jie, LU Xu-dong, GUO Wei, WANG Shi-peng, HE Wei. Prevention of Dishonest Behavior in Supply-Demand Matching [J]. Computer Science, 2021, 48(4): 303-308. |
[14] | LI Li, LI Guang-peng, CHANG Liang, GU Tian-long. Survey of Constrained Evolutionary Algorithms and Their Applications [J]. Computer Science, 2021, 48(4): 1-13. |
[15] | ZHANG Hao-chen, CAI Ying, XIA Hong-ke. Delivery Probability Based Routing Algorithm for Vehicular Social Network [J]. Computer Science, 2021, 48(3): 289-294. |
|