共 21 条
[1]
Benevenuto F., 2010, P COLL EL MESS ANT S
[2]
Choy M, 2011, CORR
[3]
Conover M, 2011, P ICWSM C
[4]
Conover M. D., 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P192, DOI 10.1109/PASSAT/SocialCom.2011.34
[5]
FLEISS JL, 1971, PSYCHOL BULL, V76, P378, DOI 10.1037/h0031619
[6]
Golbeck J, 2011, 29TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, P1105
[7]
Hu M., 2004, P 10 ACM SIGKDD INT, P168, DOI DOI 10.1145/1014052.1014073
[8]
Kucuktunc O., 2012, PROC 5 ACM INT C WEB, P633, DOI [10.1145/2124295.2124371, DOI 10.1145/2124295.2124371]
[9]
Livne A, 2011, P ICWSM C
[10]
Makazhanov Aibek, 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), P298