Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 132-137.
• Intelligent Computing • Previous Articles Next Articles
FENG Lei1,2, JI Jun-zhong1,2, WU Chen-sheng3
CLC Number:
[1]ZHI L,QIN K P,CHE L.Two citation-based indicators to measure latent referential value of papers [J].Scientometrics,2016,108(3):1299-1313. [2]BOYACK K W,BORNER K.Indicator-assisted evaluation and funding of re-search:Visualizing the influence of grants on the number and citation counts of research papers [J].Journal of the Association for Information Science and Technology,2003,54(5):447-461. [3]BOLLEN J,RODRIQUEZ M A,VAN D S.Journal status [J].Scientometrics,2016,69(3):669-687. [4]MAZLOUMIIAN A,EOM Y H,HELBING D,et al.How citation boosts promote scientific paradigm shifts and Nobel prizes [J].PLoS ONE,2011,6(5):e18975. [5]HIRSCH J E.An index to quantify an individual’s scientific research output[J].Proceedings of the National Academy of Scien-ces of the United States of America,2005,102(46):16569-16572. [6]WALKER D,XIE H,YAN K,et al.Ranking scientific publications using a model of network traffic [J].Journal of Statistical Mechanics:Theory and Experiment,2006,6(6):P06010. [7]SAYYADI H,GETOOR L.FutureRank:Ranking Scientific Articles by Predicting their Future PageRank[C]∥Siam International Conference on Data Mining.USA,2009:533-544. [8]SU C,PAN Y,ZHEN Y,et al.PrestigeRank:A new evaluation method for papers and journals [J].Journal of Informetrics,2011,5(1):1-13. [9]YAO L,WEI T,ZENG A,et al.Ranking scientific publications:the effect of nonlinearity [J].Scientific Reports,2014,4:6663. [10]JOHN P I.A generalized view of self-citation:Direct,co-author,collaborative,and Coercive induced self-citation [J].Journal of Psychosomatic Research,2015,78(1):7-11. [11]蓝梦微,李翠平,王绍卿,等.符号社会网络中正负关系预测算法研究综述[J].计算机研究与发展,2015,52(2):410-422. [12]KRISHNAN V,RAJ R.Web Spam Detection with Anti-Trust-Rank [C]∥Proceedings of the 2nd International Workshop on Adversarial Information Retrieval on the Web.New York:ACM Press,2006:37-40. [13]ZOLTAN G,HECTOR G M,JAN P.Combating Web Spam with TrustRank[C]∥Proceeding of the 30th VLDB conference.Toronto,Canada,2004:576-587. [14]ZHANG X C,LIANG W X,ZHU S P,et al.Automatic seed set expansion for trust propagation based anti-spam algorithms [J].Information Sciences,2013,232(5):167-187. [15]ZHOU J L,ZENG A,FAN Y,et al.Ranking scientific publications with similarity-preferential mechanism[J].Scientometrics,2016,106(2):805-816. [16]ELENI F,GEORGIOS E.Review of the indirect citations paradigm:theory and practice of the assessment of papers,authors and journals [J].Scientometrics,2014,99(2):261-288. [17]JOHAN B,HERBERT V D S,ARIC H,et al.A Principal Component Analysis of 39 Scientific Impact Measures [J].PLoS ONE,2009,4(6):e6022. [18]KDD Cup2003 datasets (Version2003) [DB/OL].http://www.cs.cornell.edu/projects/kddcup/datasets.html. [19]王振飞,朱静阳,郑志蕴,等.基于R-C模型的微博社区用户影响力分析[J].计算机科学,2017,44(3):254-258. |
[1] | WANG Yu-fei, CHEN Wen. Tri-training Algorithm Based on DECORATE Ensemble Learning and Credibility Assessment [J]. Computer Science, 2022, 49(6): 127-133. |
[2] | CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66. |
[3] | SANG Chun-yan, XU Wen, JIA Chao-long, WEN Jun-hao. Prediction of Evolution Trend of Online Public Opinion Events Based on Attention Mechanism in Social Networks [J]. Computer Science, 2021, 48(7): 118-123. |
[4] | YUAN De-yu, CHEN Shi-cong, GAO Jian, WANG Xiao-juan. Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game [J]. Computer Science, 2021, 48(3): 313-319. |
[5] | GUO Cong-rui, WANG Jun and FENG Yi-ming. Research on Method of Credibility Evaluation of System Simulation [J]. Computer Science, 2020, 47(6A): 567-571. |
[6] | GAO Qing-Ji, WANG Wen-bo, HOU Shi-hao and XING Zhi-wei. Traffic Strategy in Dense Crowd Environments Based on Expandable Path [J]. Computer Science, 2020, 47(6A): 34-39. |
[7] | BAO Jun-bo, YAN Guang-hui, LI Jun-cheng. SIR Propagation Model Combing Incomplete Information Game [J]. Computer Science, 2020, 47(6): 230-235. |
[8] | WU Yong, WANG Bin-jun, ZHAI Yi-ming, TONG Xin. Study on Co-citation Enhancing Directed Network Embedding [J]. Computer Science, 2020, 47(12): 279-284. |
[9] | YANG Xiao-jun, XU Zhong-fu, ZHANG Xing, SUN Dan-hui. Overview and Difficulties Analysis on Credibility Assessment of Simulation Models [J]. Computer Science, 2019, 46(6A): 23-29. |
[10] | ZHENG Hong-liang, HOU Xue-hui, SONG Xiao-ying, PANG Kuo, ZOU Li. Approach for Knowledge Reasoning Based on Hesitate Fuzzy Credibility [J]. Computer Science, 2019, 46(1): 131-137. |
[11] | GAO Peng, LIU Yun-jiang, GAO Wei-ting, LI Man, CHEN Juan. Double Thresholds DMM Cooperative Spectrum Sensing Algorithm Based on Credibility [J]. Computer Science, 2018, 45(9): 166-170. |
[12] | ZHANG Lin-zi, JIA Chuan-liang. Study of Propagation Mechanism in Networks Based on Topological Path [J]. Computer Science, 2018, 45(11A): 308-314. |
[13] | WU Wei-min, CHEN Dong-xin, LAI Wen-xin and SU Qing. Research and Implementation of EFI OS Loader Security Reinforcement Technology [J]. Computer Science, 2016, 43(9): 188-191. |
[14] | ZHANG Xue-ming, HUANG Zhi-qiu and SUN Yi. Research on Privacy Access Control Based on RBAC [J]. Computer Science, 2016, 43(1): 166-171. |
[15] | HE Xiao-xia and TAN Liang. Web Service Discovery Model of Semantic and Trust QoS Based on Hadoop [J]. Computer Science, 2015, 42(8): 220-224. |
|