<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Influence maximization based on the least influential spreaders</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Didier A. Vega-Oliveros</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lilian Berton</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alneu de Andrade Lopes</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Francisco A. Rodrigues</string-name>
          <email>franciscog@icmc.usp.br</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Instituto de Cieˆncias Matema ́ticas e de Computac ̧a ̃o Universidade de Sa ̃o Paulo - Campus de Sa ̃o Carlos 13560-970 Sa ̃o Carlos</institution>
          ,
          <addr-line>SP -</addr-line>
          <country country="BR">Brazil</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2015</year>
      </pub-date>
      <fpage>3</fpage>
      <lpage>8</lpage>
      <abstract>
        <p>The emergence of social media increases the need for the recognization of social influence mainly motivated by online advertising, political and health campaigns, recommendation systems, epidemiological study, etc. In spreading processes, it is possible to define the most central or influential vertices according to the network topology and dynamic. On the other hand, the least influential spreaders have been disregarded. This paper aims to maximize the mean of information propagation on the network by recognizing the non influential individuals by making them better spreader. Experimental results confirm that selecting 0:5% of least influential spreaders in three social networks (google+, hamsterster and advogato) and rewiring one connection to some important vertex, increase the propagation over the entire network.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Nowadays social media, such as blogs, social networks,
sharing sites, etc., can quickly spread rumors or
information [Castellano et al., 2009; Gonza´lez-Baillo´n et al., 2011],
reaching millions of users in the Global village. Propagation
process evolving information or rumors can be both
beneficial or destructive in scenarios like stock market, advertising
and marketing, adoption of technologies, politics and national
security, among other.</p>
      <p>Many of the approaches to information or rumor
spreading [Moreno et al., 2004; Castellano et al., 2009;
Gonza´lezBaillo´n et al., 2011; Borge-Holthoefer et al., 2012]
concentrate in how ideas are shared among individuals and what
are the conditions that allow a large dissemination. For this
reason, they are understood as being equivalent to
dynamics like epidemics spreading, in the sense that individuals
would be psychological ‘infected’ with some idea or
opinion [Daley and Kendall, 1964; Maki and Thompson, 1973;
Barrat et al., 2008; Castellano et al., 2009]. The rumor
spreading process assumes that the population can be divided
into groups with different states, which is generally described
as the Susceptible (inactive), Infectious (spreader) and
Recovered (stifler) (SIR) model [Daley and Kendall, 1964;
Maki and Thompson, 1973].</p>
      <p>Copyright c 2015 for the individual papers by the papers’ authors.
Copying permitted for private and academic purposes. This volume
is published and copyrighted by its editors</p>
      <p>Some individuals can have a higher social influence than
others, according to their position, topological
characteristics in the network and dynamic [Kitsak et al., 2010;
Gonza´lez-Baillo´n et al., 2011; Borge-Holthoefer et al., 2012].
A lot of researches have tried to identify influence in social
networks [Burt, 1992; Sabidussi, 1996; Kitsak et al., 2010;
Borge-Holthoefer et al., 2012]. It was found that the final
fraction of informed individuals is not significantly affected
by chosen the spreaders by topological features [Moreno et
al., 2004]. However, incorporating characteristics of real
scenarios as the activity of spreader or apathy with the new
information [Borge-Holthoefer et al., 2012], or exposure to
multiple sources and individual’s thresholds [Gonza´lez-Baillo´n et
al., 2011] lead to the emergence of influential spreaders in the
information spreading dynamic.</p>
      <p>In the other hand, the least influential individuals of the
network are ignored in the literature. Let consider the case of
a scientific collaboration network. Some research groups are
more prominent than others. If a researcher with few
publication or contacts visits a prominent group, by the homophily
phenomenon he/she can consequently improve his/her
publication capacity. Based on this, we measure the vertices’
influence and recognize the least influential spreaders. Thereby,
we propose to turn those individuals into better spreaders by
connecting to the most central nodes.</p>
      <p>The main contributions of this paper are: i) confirm the
existence of least influential individuals in the network; ii)
characterize the least influential spreaders by analyzing
centrality measures, such as degree, betweenness, closeness,
pagerank, eigenvector, k-core, clustering coefficient and
structural holes; iii) select a proportion of least influential users
from google+, hamsterster and advogato social networks and
make them better spreaders rewiring one of its connection to
a more central individual; iv) analyze the impact of different
proportions in the rewiring process and how it increases the
mean of information spreading on the network.</p>
      <p>The paper is organized as follows: Section 2 describes the
centrality measures considered for network characterization
and the spreading process (SIR model); Section 3 presents the
simulations in three social networks (google+, hamsterster
and advogato), recognizing the least influential users,
making them potential spreaders and increasing the information
capacity of the networks. Finally, Section 4 reports the final
remarks.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Definitions</title>
      <p>A social network can be represented as a static unweighted
network G = (V; E), such as V = fv1; v2; ::: vng is the
set of N vertices or actors and E = fe1; e2; ::: emg is the
set of M edges or connections. The adjacency matrix A is
the mathematical entity that represents the connections of the
network. We consider undirected networks, that means i, j
2 V , Aij = Aji = 1 if i and j are connected, or 0 otherwise.</p>
      <p>A walk between a pair of vertices (i, j) is a consecutive
sequence that starts at i and ends in j, so that any vertices are
visited more than once. The distance or length of the walk
is defined as the number of edges contained in the sequence.
Two vertices are neighbors if they are connected in a walk of
length 1. The shortest distance between two vertices is known
as the shortest path or geodesic path `ij . The shortest paths
can be computed by the Dijkstra, BellmanFord algorithms or
by a Breadth-first search method [Cormen et al., 2009]. A
component is the largest sub-set of vertices from the network
in which exist at least one walk between each pair of vertices,
but never connect to another component. A connected
network has only one component. In the case that i and j belong
to different components, it is assumed that `ij = 1. For
this reason, here we considered the largest component of the
network.
2.1</p>
      <sec id="sec-2-1">
        <title>Centrality measures</title>
        <p>Several measures have been proposed to describe the
importance or centrality of a vertex in the network [Costa et al.,
2007]. These centrality measures are defined considering
particular definitions of influence [Newman, 2003]. It is assumed
that vertices with higher centrality measure are more suitable
to influence in the opinion of others. Among some of the
possibilities, we have the popularity of a vertex (degree
centrality) [Costa et al., 2007], the proximity or how close an
individual is to the others (closeness centrality) [Sabidussi,
1996], the trusted vertices in the transmission of
information (betweenness centrality) [Freeman, 1977], the proximity
of vertices to the network core (k-core) [Seidman, 1983] or
even the renowned that an individual has (pagerank
centrality) [Brin and Page, 1998]. In the following, we present the
centrality measures adopted in this paper.</p>
        <p>Degree centrality (DG) considers the number of
connections or relations of a vertex. The set of vertices connected
to a certain vertex i is defined as the neighborhood and the
connection degree DGi represents the size of its
neighborhood [Costa et al., 2007]. It means, the higher the degree, the
more popular the vertex.</p>
        <p>Betweenness centrality (BE) is related to the capacity of
information transmission of vertices. For a vertex j this
measure quantified the number of shortest paths that pass through
j between all pair of vertices (i, k) [Freeman, 1977], with
i, j and k different. The centrality measure expresses how
much the vertex j works as bridge, meaning how confidence
or trusted is j in the network.</p>
        <p>Eigenvector centrality (EV) takes into account that
vertices with same degree have different levels of importance
according to the importance of their neighbors. The
eigenvector centrality is the principal eigenvector associated with
the greatest eigenvalue of the adjacency matrix A. It describes
the importance of the vertices given the quality of its
connections [Bonacich, 1972].</p>
        <p>Pagerank centrality (PR) derives from a Markovian
process that follows a random walk navigation through the
network. It expresses the importance of the vertices considering
the probability of arriving at certain vertex after a large
number of steps. The pagerank was initially proposed to rank web
pages [Brin and Page, 1998] and the idea is to simulate the
behavior of a user that is surfing on the net. The user navigates
following the links available at the current page or, she/he can
jump to other pages by typing a new URL in the browser. In
social networks it can be approached like the more cited or
renowned individuals.</p>
        <p>Closeness centrality (CL) is the average of the shortest
paths from each vertex to the rest of the network [Sabidussi,
1996]. Formally, the closeness centrality is the inverse of the
average of the shortest paths from i to all the vertices, i.e.,
CLi = N=X `ij . Thereby, vertices that are closer to the
j6=i
others have higher closeness centrality. For the sake of
calculating the centrality for disconnected networks, the average is
considered by component.</p>
        <p>k-core centrality (KC) describes the topology of the
network in terms of sub network decomposition in cores. The
core of k order (Hk) is the set of vertices where for each
vertex i in Hk its degree ki k. It means, k is the
maximum core that i can belongs, with Kc(i) = k and Hk been
the largest set of vertices with this property [Seidman, 1983].
The main core is the set of vertices with the largest k-core
value from the network, and these vertices are the most
central. Vertices with low values of k-core are commonly located
at the periphery of the network. Not necessary all the
highdegree vertices have higher k-core values. For instance, hubs
located in the periphery would have small values of k-core,
or vertices with larger k-core value could have not so large
degree [Kitsak et al., 2010].</p>
        <p>Clustering coefficient (CT) or transitivity is a common
property in real-world networks. In social networks it means
that if A has one friend that is also friend of B, there is a strong
tendency that A being also a friend of B. In topology terms it
is the presence of triangles (cycles of order three) in the
network. The clustering coefficient [Watts and Strogatz, 1998]
for a vertex CTi is defined as the number of triangles centered
on i over the maximum number of possible connections for i.
CTi has value 1 if all neighbors of i are interconnected.</p>
        <p>Structural Holes (HO) considers all the vertices as an ego
network, where connections no related with each vertex have
not direct effect. The key factor is the redundancy that each
vertex has in its neighborhood, evaluating if its position and
connections brings some opportunities. It means that the
success of an individual i within a social network or organization
is related to access local bridges (trusted people) [Burt, 1992].
If removed i from the network, a structural hole will happen
in the local neighborhood. These individuals are important to
the connectivity of local regions.</p>
        <p>The network can be characterized by average the centrality
measures of all vertices i.e., hDGi = N1 Pn
i=1 DGi, and is
similar for the other measures.
Spreading is a pervasive process in society and several models
have been developed in order to understand the propagation
of ideas or opinions through social networks [Castellano et
al., 2009]. In classical rumor spreading models the ignorant
or inactive (S) are those who remain unaware of the
information, the spreaders (I) are those who disseminate the ideas,
and the stifler (R) are those who know the information but
lose the interest in spreading it. All vertices have the same
probability for convincing their neighbors and probability
for stopping to be active as propagator.</p>
        <p>The Maki-Thompson (MT) [Maki and Thompson, 1973]
rumor approach was employed to model the spreading
process. In the MT whenever an active spreader i contacts a
vertex j that is inactive, the latter will become active with
a fixed probability . Otherwise, when j knows about the
rumor, it means j is a spreader or a stifler, the vertex i will
turn into a stifler with probability . The behavior when the
spreader stops to propagate is understood because the
information is too much known (contacting spreaders) or without
novelty (contacting stifler). The general rules of contact can
be represented as:
8
&gt; Ii + Sj
&lt;</p>
        <p>! Ij ;</p>
        <p>Ii + Rj ! Ri ; (1)
&gt;: Ii + Ij ! Ri ;
where i and j are neighbors and the operator “+” means the
contact between them.</p>
        <p>In terms of Monte Carlo (MC) implementation, let
consider a constant population of N vertices in all time steps.
Each vertex can be only in one state, that is Ii(t) = 1 if i 2
I, otherwise Ii(t) = 0, and Si(t) + Ii(t) + Ri(i) = 1. The
macroscopic fraction of ignorant ( (t)), spreaders ( (t)) and
stifler ('(t)) over time is calculated as (t) = N1 PN
i=1 Si(t),
that is similar to the other states and always fulfill (t) +
(t) + '(t) = 1. We assume that infection and recovering do
not occur during the same discrete time window or step. Also
the case when a spreader randomly contacts one neighbor per
unit time, the contact process, was adopted.</p>
        <p>The initial setup for the propagation is (0) = 1 1=N ,
(0) = 1=N and '(0) = 0. Each simulation begins with a
uniformly selection of vertices as defined in the initial setup.
At each time step, all spreaders uniformly select one of its
neighbors and try to infect it with probability , or stop the
propagating with probability . The simulations run until the
end of the propagation process is reached, when 1 = 0.</p>
        <p>Different theoretical models have been proposed for
modeling the rumor dynamics in networks [Moreno et al., 2004;
Barrat et al., 2008; Castellano et al., 2009; Borge-Holthoefer
et al., 2012]. These analytical models make assumptions
about the network structure such as the degree correlation
or distribution, compartments or class of vertices with same
probabilities, homogeneous mixing or mean field theory.
Notwithstanding all of them claim that their numerical
solutions agree with the MC simulations, so we adopt this
approach.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Maximization of least influential spreaders</title>
      <p>We analyze the spreading capacity in the microscopic and
macroscopic scales of the propagation. For each vertex i 2
V , we calculate the final fraction of stifler 'i . This
quan1
tity represents how long the rumor propagates in the
network starting in i. Each 'i1 were average over 90
realizations. For the macroscopic propagation scale, the 'V
repre1
sents the mean of spreading capacity for all vertices, it means
'V1 = (Pi2V 'i1)=N .
3.1</p>
      <sec id="sec-3-1">
        <title>Dataset</title>
        <p>We employ the following social networks: the
hamsterster [Kunegis, 2014], an undirected and unweighted network
based on the website data from HAMSTERSTER.COM. The
vertices are the users of the system and the edges represent
a relationship among users. It consists of friend and
family relationship between the users of the website. The
advogato [kon, 2014], an online community platform for
developers of free software launched in 1999. Vertices are users of
advogato and the directed edges represent trust relationships.
Finally, the google+ [Gpl, 2014] contains Google Plus
useruser links. The directed edge denotes that one user has the
other in his circles, but we assume the network as undirected.
We always consider the main component for these networks.</p>
        <p>The topological characteristics of these networks are
summarized in Table 1, with the corresponding averages of
the centralities: degree hDGi, clustering coefficient hCT i,
structural holes hHOi, betweenness hBEi, closeness hCLi,
eigenvector hEV i, k-core hKCi and pagerank hP Ri. The
google+ is more an egocentric network (hHOi) than others,
where vertices are very close (hCLi) and most of them have
few connections. The hamsterster is a more sparse network
with more triangles (hCT i) and connections between users.
And, advogato is a more dense network and in the middle
term of the previous.
3.2</p>
      </sec>
      <sec id="sec-3-2">
        <title>Propagation analysis</title>
        <p>For evaluating the impact of the least influential users in
the networks, we employ the z-score normalization over the
spreading capacities 'i1 and sort the values in ascending
order. The z-score indicates how many standard deviations an
element is according to the mean. The z-score of a raw value
hamsterster
advogato
google+
x is z = x , where: is the mean and is the standard
deviation of the population. The impact is shown in
Figure 1, where considering 10% of least influential spreaders,
the mean decreases around 3 standard deviations. This
decreasing behavior continues successively. The less influential
spreaders impact the overall mean of spreading capacity.</p>
        <p>We aim to recognize these least influential spreaders in
order to improve their influence. Following, we considered the
centrality measures and analyzed the topological influence
over the propagation and data clustering to find patterns on
these individuals.
3.3</p>
      </sec>
      <sec id="sec-3-3">
        <title>Topological analysis</title>
        <p>Z-score was calculated for each centrality measure and
network (Figure 2 a-c). The fraction of individuals was sorted
in ascending order for each centrality. Vertices with lowest
eigenvector centrality always led the lowest z-score values.</p>
        <p>Jaccard coefficient was employed in order to measure the
proportion of least influential spreaders contained in each
group of vertices with lower centrality measure (Figure 2 d-f).
The Jaccard coefficient compares the similarity and diversity
of sample sets. It measures similarity between finite sample
sets, and is defined as the size of the intersection divided by
the size of the union of the sample sets: J (A; B) = jjAA\[BBjj .
Here, for each centrality measure A represents the proportion
of vertices with lowest values and B the fraction of least
influential vertices. We define the least influential users as the
vertices that achieved propagation values 'i1 '2V1 . Selecting
less than 10% of vertices with lowest eigenvector centrality,
it was obtained around half of the less influential spreaders.</p>
        <p>The topological properties considering 1% of vertices with
least influential spreading and lowest EV value were
analyzed. We verify if these vertices also have low values in
other centralities. For each centrality measure we
normalize the values by its own average. Therefore, it is possible
to compare the networks and the maximum values achieved
(Figure 2 g-i). We observe that the topological properties of
individuals with lowest EV values are a subset of the values
presented for the least influential spreaders group. Unlike
expected, vertices with BE, DG or PR above the mean may be
also less influential spreaders.
We perform a clustering analysis in order to discover the
group of least influential spreaders according to the
topological characteristics of the vertices. As objects in the same
group are more similar to each other than those in other
groups, we aim to identify common properties of the elements
that belong to the group with lowest propagation rates.</p>
        <p>We apply the popular k-means clustering [Macqueen,
1967] that partitions data into k mutually exclusive clusters.
Each cluster is defined by its members and by its centroid
that represents the point to which the sum of distances from
all objects in the cluster is minimized. We used the Weka1
implementation with the standard configuration.</p>
        <p>The result for the google+ network is shown in Table 2.
As we set the parameter k = 3 the k-means generates three
clusters. We are mainly interested in the cluster 1 because
has the individuals with the lowest propagation mean. By
comparing the mean of the measures among clusters 1, 2 and
3, we observe that the values of EV 0 and HO 1 are
detachable in comparison to other clusters.</p>
        <p>When performed the cluster analysis in hamsterster and
advogato, the more significant measures were CL &lt; 0:5 and
also EV 0. In all the case, individuals with eigenvector
values close to zero are in the cluster with lowest
spreading capacity. If we aim to find a cluster with non
influential spreaders in the network, we can run the k-means
algorithm until some group partition achieve an eigenvector mean
hEV i &lt; 1=n. This pattern confirms the results of the
topological analysis. Hence, we generalize that the lower the
eigenvector value, the lower the spreading capacity of
vertices.</p>
        <p>1http://www.cs.waikato.ac.nz/ml/weka
0.45
0.4
0.35
ten 0.3
iif
c
fe0.25
o
c
rda 0.2
c
cJa0.15
0.1
0.05
00
0.5
ls 0
a
u
ivd−0.5
i
d
n
ied −1
m
r
fno−1.5
if
o
rcoe −2
s
z−−2.5
−30</p>
        <p>DG
BE
CL
PR
EV
KC
CT
HO
DG
BE
CL
PR
EV
KC
CT
HO
DG
BE
CL
PR
EV
KC
CT
HO</p>
        <p>0
lsa −2
u
d
ii
v
ind −4
d
e
rom−6
if
n
freo −8
o
c
zs−−10
−12
0 CT</p>
      </sec>
      <sec id="sec-3-4">
        <title>Influence maximization</title>
        <p>For improving the spreading capacity of the network we
selected 5%; 2:5% and 0:5% of the vertices with lower EV. For
each vertex only one of its edges was randomly selected and
rewired to an influential vertex of the network. We randomly
consider vertices with highest DG, BE, EV and PR
centrality and exchange only one edge of each influencer. For each
measure and proportion of lowest EV vertices to be rewired,
we have the resulting spreading capacity ('V ) normalized by
1
the mean of the non maximized case (Table 3). When
connecting the least influential spreaders to vertices with highest
DG centrality leads to 6 second places and 1 first place
results. Hence, the visual results selecting 0:5% of lowest EV
connecting to vertices with highest DG centrality are shown
in Figure 3. The overall mean of propagation was increased
for each network. The z-score also increases for the other
measures in the entire network and not only for the 0:5% of
the selected vertices (Figure 3). For the best cases the
improvements achieved an overall mean larger than the highest
spreading value of the non maximized case.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Final remarks</title>
      <p>This paper explored the least influential spreaders of a
network considering centrality measures and analyzing
topological and data clustering approaches. The results indicate that
vertices with eigenvector value EVi &lt; 1=N have little
influence in the network. We selected 5%; 2:5% and 0:5% of
these individuals and rewired only one edge to an influential
vertex. This approach improves propagation capacity of those
vertices and the mean of the propagation in three social
networks considered: google+, hamsterster and advogato. More
efficient targeted actions can be performed to improve the
diffusion on the network. Selecting a few non influential users
and presenting them to one influencer, they can change their
action, become better spreaders and improve the overall
diffusion capacity. For example, the promotion of interchange of
students to prominent institutions, or famous/popular people
giving talks in common places or to specific groups of
individuals, can produce a considerable impact in the diffusion of
ideas and benefits. The motivation or incentive for the most
important vertices may be monetary, ideological causes,
increase publications and impact, among others. This is a work
in progress that shows promising experimental results. New
paths of study can be developed by analyzing the least
influential spreaders and dynamics.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>This research was supported by National Council for Scientific and
Technological Development (CNPq) grant: 140688/2013-7 and Sao
Paulo Research Foundation (FAPESP) grant: 2011/21880-3.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [Barrat et al.,
          <year>2008</year>
          ]
          <string-name>
            <given-names>Alain</given-names>
            <surname>Barrat</surname>
          </string-name>
          , MarseilleMarc Barthe´lemy, and Alessandro Vespignani.
          <source>Dynamical Processes on Complex Networks</source>
          . Cambridge University Press,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <source>[Bonacich</source>
          , 1972]
          <string-name>
            <given-names>Phillip</given-names>
            <surname>Bonacich</surname>
          </string-name>
          .
          <article-title>Factoring and weighting approaches to clique identification</article-title>
          .
          <source>Journal of Mathematical Sociology</source>
          ,
          <volume>2</volume>
          :
          <fpage>113</fpage>
          -
          <lpage>120</lpage>
          ,
          <year>1972</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [
          <string-name>
            <surname>Borge-Holthoefer</surname>
          </string-name>
          et al.,
          <year>2012</year>
          ]
          <string-name>
            <given-names>Javier</given-names>
            <surname>Borge-Holthoefer</surname>
          </string-name>
          , Sandro Meloni, Bruno Gonc¸alves, and Yamir Moreno.
          <article-title>Emergence of Influential Spreaders in Modified Rumor Models</article-title>
          .
          <source>Journal of Statistical Physics</source>
          ,
          <volume>151</volume>
          (
          <issue>1-2</issue>
          ):
          <fpage>383</fpage>
          -
          <lpage>393</lpage>
          ,
          <year>September 2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <source>[Brin and Page</source>
          , 1998]
          <string-name>
            <given-names>S.</given-names>
            <surname>Brin</surname>
          </string-name>
          and
          <string-name>
            <surname>L. Page.</surname>
          </string-name>
          <article-title>The anatomy of a largescale hypertextual web search engine</article-title>
          .
          <source>Computer Networks and ISDN Systems</source>
          , V:
          <fpage>107</fpage>
          -
          <lpage>117</lpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <source>[Burt</source>
          , 1992]
          <string-name>
            <surname>Ronald</surname>
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Burt</surname>
          </string-name>
          .
          <article-title>Structural holes: The social structure of competition</article-title>
          . Harvard University Press, Cambridge, MA,
          <year>1992</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [Castellano et al.,
          <year>2009</year>
          ]
          <string-name>
            <given-names>Claudio</given-names>
            <surname>Castellano</surname>
          </string-name>
          , Santo Fortunato, and
          <string-name>
            <given-names>Vittorio</given-names>
            <surname>Loreto</surname>
          </string-name>
          .
          <source>Statistical Physics of Social Dynamics. Reviews of Modern Physics</source>
          ,
          <volume>81</volume>
          (
          <issue>2</issue>
          ):
          <fpage>591</fpage>
          -
          <lpage>646</lpage>
          , may
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [Cormen et al.,
          <year>2009</year>
          ]
          <string-name>
            <surname>Thomas</surname>
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Cormen</surname>
          </string-name>
          , Charles E. Leiserson, Ronald L.
          <string-name>
            <surname>Rivest</surname>
            , and
            <given-names>Clifford</given-names>
          </string-name>
          <string-name>
            <surname>Stein</surname>
          </string-name>
          . Introduction to Algorithms. The MIT Press,
          <volume>3</volume>
          <fpage>edition</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [Costa et al.,
          <year>2007</year>
          ]
          <string-name>
            <given-names>L.D.F.</given-names>
            <surname>Costa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.A.</given-names>
            <surname>Rodrigues</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G</given-names>
            <surname>Travieso</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>P.R. Villas</given-names>
            <surname>Boas</surname>
          </string-name>
          .
          <article-title>Characterization of complex networks: A survey of measurements</article-title>
          .
          <source>Adv. in Physics</source>
          ,
          <volume>56</volume>
          :
          <fpage>167</fpage>
          -
          <lpage>242</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <source>[Daley and Kendall</source>
          , 1964]
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Daley</surname>
          </string-name>
          and
          <string-name>
            <given-names>D. G.</given-names>
            <surname>Kendall. Epidemics</surname>
          </string-name>
          and Rumours.
          <source>Nature</source>
          ,
          <volume>204</volume>
          (
          <issue>4963</issue>
          ):
          <fpage>1118</fpage>
          -
          <lpage>1118</lpage>
          ,
          <year>1964</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>[Freeman</source>
          , 1977]
          <string-name>
            <given-names>L C</given-names>
            <surname>Freeman</surname>
          </string-name>
          .
          <article-title>A set of measures of centrality based on betweenness</article-title>
          .
          <source>Sociometry</source>
          ,
          <volume>40</volume>
          :
          <fpage>35</fpage>
          -
          <lpage>41</lpage>
          ,
          <year>1977</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <article-title>[Gonza´lez-Baillo´n et al</article-title>
          .,
          <year>2011</year>
          ]
          <article-title>Sandra Gonza´lez-Baillo´n, BorgeHolthoefer</article-title>
          , Javier Rivero, and
          <string-name>
            <given-names>Yamir</given-names>
            <surname>Moreno</surname>
          </string-name>
          .
          <article-title>The dynamics of Protest Recruitment through an Online Network</article-title>
          .
          <source>Scientific Reports</source>
          ,
          <volume>1</volume>
          :
          <issue>197</issue>
          :
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>[Gpl</source>
          , 2014]
          <article-title>Google+ network dataset - KONECT</article-title>
          , dec
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [Kitsak et al.,
          <year>2010</year>
          ]
          <string-name>
            <given-names>Maksim</given-names>
            <surname>Kitsak</surname>
          </string-name>
          ,
          <string-name>
            <surname>Lazaros K. Gallos</surname>
            , Shlomo Havlin, Fredrik Liljeros, Lev Muchnik,
            <given-names>H. Eugene</given-names>
          </string-name>
          <string-name>
            <surname>Stanley</surname>
            , and Herna´n
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Makse</surname>
          </string-name>
          .
          <article-title>Identification of influential spreaders in complex networks</article-title>
          .
          <source>Nature Physics</source>
          ,
          <volume>6</volume>
          (
          <issue>11</issue>
          ):
          <fpage>888</fpage>
          -
          <lpage>893</lpage>
          ,
          <year>August 2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [kon, 2014]
          <article-title>Advogato network dataset -</article-title>
          KONECT,
          <year>October 2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <source>[Kunegis</source>
          , 2014]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kunegis</surname>
          </string-name>
          . KONECT, jan
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>[Macqueen</source>
          , 1967]
          <string-name>
            <given-names>J.</given-names>
            <surname>Macqueen</surname>
          </string-name>
          .
          <article-title>Some methods for classification and analysis of multivariate observations</article-title>
          .
          <source>In In 5-th Berkeley Symp. on Math. Stats. and Prob</source>
          ., pages
          <fpage>281</fpage>
          -
          <lpage>297</lpage>
          ,
          <year>1967</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <source>[Maki and Thompson</source>
          , 1973]
          <string-name>
            <given-names>D. P.</given-names>
            <surname>Maki</surname>
          </string-name>
          and
          <string-name>
            <given-names>M</given-names>
            <surname>Thompson</surname>
          </string-name>
          .
          <article-title>Mathematical Models and Applications, with Emphasis on the Social, Life, and</article-title>
          <source>Management Sciences. Prentice-Hall</source>
          ,
          <year>1973</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [Moreno et al.,
          <year>2004</year>
          ]
          <string-name>
            <given-names>Yamir</given-names>
            <surname>Moreno</surname>
          </string-name>
          , Maziar Nekovee,
          <string-name>
            <given-names>and Amalio F.</given-names>
            <surname>Pacheco</surname>
          </string-name>
          .
          <article-title>Dynamics of rumor spreading in complex networks</article-title>
          .
          <source>Physical Review E</source>
          ,
          <volume>69</volume>
          (
          <issue>6</issue>
          ):066130, jun
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <source>[Newman</source>
          , 2003
          <string-name>
            <surname>] M E J Newman.</surname>
          </string-name>
          <article-title>The structure and function of complex networks</article-title>
          .
          <source>SIAM Review</source>
          ,
          <volume>45</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <source>[Sabidussi</source>
          , 1996]
          <string-name>
            <given-names>G</given-names>
            <surname>Sabidussi</surname>
          </string-name>
          .
          <article-title>The centrality index of a graph</article-title>
          .
          <source>Psychometrika</source>
          ,
          <volume>31</volume>
          :
          <fpage>581</fpage>
          -
          <lpage>603</lpage>
          ,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <source>[Seidman</source>
          , 1983]
          <string-name>
            <given-names>S</given-names>
            <surname>Seidman</surname>
          </string-name>
          .
          <article-title>Network structure and minimum degree</article-title>
          .
          <source>Social networks</source>
          ,
          <volume>5</volume>
          (
          <issue>3</issue>
          ):
          <fpage>269</fpage>
          -
          <lpage>287</lpage>
          ,
          <year>1983</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <source>[Watts and Strogatz</source>
          , 1998]
          <string-name>
            <given-names>Duncan J</given-names>
            <surname>Watts and Steven H Strogatz</surname>
          </string-name>
          .
          <article-title>Collective dynamics of s`mall-world' networks</article-title>
          .
          <source>Nature</source>
          ,
          <volume>393</volume>
          (
          <issue>6684</issue>
          ):
          <fpage>440</fpage>
          -
          <lpage>442</lpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>