<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Constrained Multi-view Clustering Approach to Influence Role Detection</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Chengyao Chen</string-name>
          <email>cscchen@comp.polyu.edu.hk</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dehong Gao</string-name>
          <email>dehong.gdh@alibaba-inc.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Wenjie Li</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuexian Hou</string-name>
          <email>yxhou@tju.edu.cn</email>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>1688cn, Alibaba.INC(Hangzhou)</institution>
          ,
          <country country="CN">China</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Computing, The Hong Kong Polytechnic University</institution>
          ,
          <country country="HK">Hong Kong</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Popular among people</institution>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>School of Computer Science and Technology, Tianjin University</institution>
          ,
          <country country="CN">China</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2015</year>
      </pub-date>
      <fpage>29</fpage>
      <lpage>34</lpage>
      <abstract>
        <p>Twitter has provided people with an effective way to communicate and interact with each other. It is an undisputable fact that people's influence plays an important role in disseminating information over the Twitter social network. Although a number of research work on finding influential users have been reported in the literature, they never really seek to distinguish and analyze different influence roles, which are of great value for various marketing purposes. In this paper, we move a step forward to further detect five recognized influence roles of Twitter users with regard to a particular topic. By exploring three views of features related to topic, sentiment and popularity respectively, we propose a novel constrained multi-view influence role clustering approach to group potential influential Twitter users into five categories. Experimental results demonstrate the effectiveness of the proposed approach.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>Nowadays, Twitter has become one of the most popular
social media platforms for people to share information and
communicate with each other. It creates more and more new
business opportunities with a variety of online marketing
activities [Anagnostopoulos et al., 2008]. Recent years have
witnessed that an increasing number of enterprises have
started to attach importance to locating favorable influential
users and manipulating their opinions to attract potential
customers or improve sales. Understanding social influence
over large-scale networks is crucial to business marketing
management.</p>
      <sec id="sec-1-1">
        <title>Although all influential users perform influence on others,</title>
        <p>[Brown and Hayes, 2008]has verified that the way people use
to influence others varies and produces different effect.</p>
      </sec>
      <sec id="sec-1-2">
        <title>Someone always strongly praises a product and persuades</title>
        <p>others to buy. Someone changes others’ opinions on a
product with professional analysis. Someone timely informs</p>
      </sec>
      <sec id="sec-1-3">
        <title>Copyright © 2015 for the individual papers by the papers' authors. Copying permitted for private and academic purposes. This volume is published and copyrighted by its editors</title>
        <p>others the latest news of a product. And someone promotes
the product by popularity. It is quite clear that different
influential users play different influence roles. Meanwhile, a
company may have different objectives in different
promotion stages and needs users with different influence
roles to conform to [Brown and Hayes, 2008]. For example,
a company which targets to improve product brand awareness
may want to choose the users with high popularity to help
with. However, for a company whose product quality is
questioned by customers, it may be a better choice to invite
domain experts who have professional knowledge to explain
and convince. Selecting influential users with appropriate
influence roles in accordance with specific marketing
objectives is more effective than just seeking for the most
influential ones in general.</p>
      </sec>
      <sec id="sec-1-4">
        <title>Despite the importance of influence role, previous work</title>
        <p>mostly emphasizes on measuring the general influence power
of a user on others through the information of the netwrok
structure[Cha et al., 2010; Weng et al., 2010], or maximizing
the influence propagation which assists companies to find the
proper set of people to promote products [Kempe et al., 2003;
Chen et al., 2009]. Without any exception, they all take the
influence as the same type. The lack of considering the effects
of different influence roles on different marketing objectives
will inevitably hinder the companies from proposing more
suitable marketing strategies. This motivates us to further
analyze and detect different influence roles of users, which
could be used to further extend the previous work in
achieving different marketing goals. [Chen et al., 2014]
proposed the idea to distinguish different types of influential
users, but lacked compelte study on how to detect them.</p>
      </sec>
      <sec id="sec-1-5">
        <title>Show no obvious influence</title>
      </sec>
      <sec id="sec-1-6">
        <title>Enhance brand</title>
        <p>memorability</p>
      </sec>
      <sec id="sec-1-7">
        <title>Improve</title>
        <p>reputation</p>
      </sec>
      <sec id="sec-1-8">
        <title>Improve awareness</title>
      </sec>
      <sec id="sec-1-9">
        <title>None</title>
      </sec>
      <sec id="sec-1-10">
        <title>To better characterize influence roles, we define five</title>
        <p>distinct categories with reference to the definition in the
WOMMA’s influencer guidebook
(www.womma.org/influencers). They are enthusiast,
information disseminator, expert, celebrity and others. The
brief descriptions of them are summarized in Table 1. We can
clearly see that one’s influence role is largely determined by
his/her behaviors and personal characteristics, but not totally
dependent on how much influence he/she has. Different from
previous work that measures users’ influence mainly based
on social connections, we summarize three aspects that help
to distinguish influence roles, including the interest to a topic
(e.g., enthusiast, information disseminator and expert pay
more attention than the other two), the attitude to the topic
(e.g., enthusiast always praises, expert sometimes praises and
sometimes not) and the popularity over the social network
(e.g., celebrity has more followers). Accordingly we extract
three views of features, i.e., the topic view, the sentiment
view and the popularity view from users’ posts and profiles
for influence role detection.</p>
      </sec>
      <sec id="sec-1-11">
        <title>We also note that each view can only partially reflect the</title>
        <p>influence role from its own perspective. However, when they
complement with each other, the three views together provide
more complete information for influence roles. Based on the
three-view user representations, we propose a novel
Constrained Multi-view Influence Role Clustering (CMIRC)
approach upon an optimization framework to partition
influential users into five recognized categories. Unlike other
existing multi-view clustering approaches, CMIRC allows
the cluster numbers in the different views to be different and
so provides more flexibility for integrating data from
multiviews. It connects the local clustering information from each
individual view and the global multi-view clustering results
with a local-global mapping mechanism.</p>
        <p>Another advantage of CMIRC is its capability to
incorporate the prior knowledge based upon the
semisupervised learning framework. Actually, it is very common
that the influence roles are known to a small number of users
who are easily identified by a company. Then people can use
such information as the prior knowledge to find out many
others for their needs. To incorporate the prior knowledge to
guide clustering, we apply two kinds of group-level
constraints, the same-cluster constraints and the
differentcluster constraints, to define which groups of users must be
or must not be in the same cluster. The experimental results
demonstrate the effectiveness of CMIRC when compared
with other single-view and multi-view clustering approaches
2
2.1</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Influence Role Detection</title>
    </sec>
    <sec id="sec-3">
      <title>Three-View User Representation</title>
      <sec id="sec-3-1">
        <title>Topic-view Representation</title>
        <p>The motivation of using topic view is the intuition that
different roles may have different degrees and different
focuses of attention to the topic. To start with, a word like
“iPhone” is selected as the topical word. Then, measured by
the mutual information, the K most relevant words that
cooccur with the topical word within a window of size two are
extracted as keywords to form the topic profile collectively.</p>
        <sec id="sec-3-1-1">
          <title>These K words provide a more complete picture of the topic than the topical word itself. For all the tweets of a given user, a topical vector weighed by tf-idf is built to capture his/her word distribution over the extracted keywords.</title>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>Sentiment-view Representation</title>
        <sec id="sec-3-2-1">
          <title>The sentiment view reveals the preferred attitudes when a</title>
          <p>user expresses his/her opinions and tends to differentiate
among the enthusiast who often posts tweets with positive
sentiments, the disseminator whose tweets is mainly neutral
ones and the expert whose opinions may be either positive or
negative. To measure the sentiment of users, the lexicon
AFINN (http://www2.compute.dtu.dk/~faan/data/) is used,
where each word is attached with an integer value between
negative five and positive five, denoting its sentiment polarity
and strength. Based on this lexicon, the positive/negative
sentiment scores of a tweet are calculated by aggregating the
sentiment strengths of all the positive/negative words it
contains. The sentiment view representation of a user is then
defined as the average positive-sentiment score and average
negative-sentiment score of all his/her tweets</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>Popularity-view Representation</title>
        <p>Apart from the interests and attitudes to a topic, the popularity
(or to say the authority) of a user can also imply the influence
role in some extent. Three features are selected including the
number of followers, the number of followees and a binary
value indicating whether a user account is verified or not. The
popularity view tends to distinguish the people with different
levels of popularity like celebrities and enthusiasts.
2.2</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Constrained Multi-view Influence Role</title>
    </sec>
    <sec id="sec-5">
      <title>Clustering</title>
      <p>To better use the data collected from multiple sources,
multiview clustering approaches partition data into clusters by
integrating features from multiple views. They have been
successfully applied to image recognition and text mining, etc.
[Bickel et al., 2004; Cai et al., 2013; Liu et al., 2013]. These
approaches share a common assumption, i.e., the features
from each single view are complete for clustering, yet better
clustering performance can be expected by exploring the rich
information among multiple views. Naturally, the cluster
numbers of different views are often supposed equal to the
final multi-view cluster number. From the previous analysis,
however, we believe that it is more reasonable and practical
to allow the cluster numbers of different views to be different
for influence role detection. As a result the clustering results
in each view will be also different from the ultimate
clustering results. To this end, we develop a Constrained</p>
      <sec id="sec-5-1">
        <title>Multi-view Influence Role Clustering (CMIRC) approach to group data into different numbers of clusters in individual views (i.e., local clusters) and utilize the mapping matrix to bridge the gap between the single-view clusters and the multi</title>
        <p>view clusters (i.e., global clusters). The introduction of the
mapping matrix is one of the main contributions of this work.</p>
        <p>Another advantage of this approach is its semi-supervised
framework that allows us to incorporate the prior knowledge
easily. Say, we can take a small number of users whose
influence roles are manually labeled as the prior knowledge
to guide the clustering of others. To incorporate the prior
knowledge into CMIRC, we employ two kinds of group-level
constraints [Law et al., 2004] to define which group of users
must be or must not be in the same cluster. Specifically, the
same-cluster (</p>
        <p>) constraints include several groups of users
and the users in each group must belong to the same cluster,
either local or global cluster. The different-cluster ( 
)
constraints contain several group pairs and the users in the
two groups of a pair cannot be in the same cluster.</p>
      </sec>
      <sec id="sec-5-2">
        <title>To better describe our approach, let’s start with a variant</title>
        <p>K-means clustering algorithm
which utilizes data from
multiple sources [Cai et al., 2013]. Let  = {
represents n Twitter users. Each user   is represented by m
views of features,   = { 1,   2, … ,    } , where the j-th
element    represents the features of view j, and it is a row
vector containing   elements. Then a typical multi-view
1,  2, … ,   }
be formulated
as the following
clustering task</p>
        <p>can
optimization problem.</p>
        <p />
        <p>,
min ∑</p>
        <p>∑   ‖ 
=1 =1
 −      ‖
2
. . ∑  
= 1,</p>
        <p>∈ {0,1}, ∀ = 1,2, … , , ∑   = 1
Similar to K-means,  
∈
1× 
here describes the cluster
indicator for user   in view j. It also represents the local
clustering results.   and   ∈
  × 
denote the cluster
number and cluster centers in view j.   is a factor to balance
the weight of view j. If the cluster numbers in all m views are
the same (i.e.,   =t, where t represents global cluster
number),</p>
        <p>for all the views should be consistent. This
implies that the local clustering results in every view are
equal to the global clustering results. However, with our
assumption, the cluster number in each view is different, so
we cannot derive the global clustering results directly from

 . In order to connect local clustering and global clustering
together, we transform the local clustering results   in view
j into the combination of global cluster assignment   ∈
1×
and a mapping matrix   ∈
×</p>
        <p>.
 
 
corresponds his global cluster. Assume that   belongs to the
first global cluster as presented in   and the mapping matrix
describes the first global cluster is mapped to the second local
cluster. Then   should be found in the second local cluster.</p>
        <p>Apart from the use of mapping matrix, two types of
constraints are also integrated into CMIRC. They are defined
( 
{
through</p>
        <p>user groups   = { 1,  2, … ,  (   )} ,
 ) is the number of users in this user group 
where
 .
SameCluster constraints are a set of user groups, i.e., 
=
1, 
2, … ,   } . The users in each 
group must be
assigned to the same cluster. Different-Cluster constraints are
a set of user group pairs, i.e., 
= { 1,  2, … ,   } and   =
⟨   ,</p>
        <p>⟩. The users in two different groups of a pair in 
must belong to different clusters. All users in 
during cluster assignment, we could assign a cluster to the
whole group without the need to assign users to clusters one
by one. Such a strategy avoids computational complexity in
the optimization procedures introduced later.</p>
        <p>Finally, CMIRC that partitions the users  into t clusters with
m-view
features
constrained
by 
formulated by the following optimization problem
 , ,
min ∑</p>
        <p>=1  =1
∑   ‖   −</p>
        <p>‖
2
can</p>
        <p>be
(1)
=1

=1





 =1

=1
 
=1
  
∀⟨
∑   
. . ∑ 

= 1,</p>
        <p>∈ {0,1}, ∑   = 1,
≥ 1, ∀ = 1, … , , ∑ 
= 1, ∀ = 1, … ,  
where   represents the global cluster assignment for user
  which satisfies 1-of-K coding scheme.   is the local
cluster center in the j-th view and   is the mapping matrix.
  satisfies the constraints that every local cluster must be
mapped to at least one global cluster and every global cluster
must be mapped to one and only one local cluster.</p>
        <p>In order to solve this optimization problem, we rewrite the
objective function in Equation (1) as Equation (2), and apply
the following iterative updating process to solve it.</p>
        <p>, ,

= min ∑     ,

where   =  {( 
−       )  ( 
−       ) ,
and   is the degree matrix derived from   .




=</p>
        <p>1
2‖  ‖
, ∀ = 1,2, …  , and   =   − 
  
 Fix ,</p>
        <p>,   and update local cluster center</p>
        <p>As stated before, the combination of   and   represent
local cluster results. In this step, the local cluster centers are


(2)
(3)
updated by minimizing the distances from users to their
corresponding clusters. It is solved by differentiating the
objective function in Equation (2) for each view with respect
to   . The optimal solution of   is obtained by setting the
derivation to zero, which gives us</p>
        <p>=    
 
 
  (  

    
   )−1
(4)
 Fix   ,   ,   and update global cluster assignment</p>
        <p>We update  through each row of its,   in the following
order. First we update   for the users
who are not
constrained separately, and then update   for the users who
are in</p>
        <p>together. In particular, if the user   is not
constrained, we locate the local cluster for each user through
the mapping matrix. Then, what we need to do is to find
  from its limited solutions that minimize the sum of
distances between it and the center of its assigned local
cluster for each view, as presented in the Equation (5).
  = argmin ∑   ‖   −    
   ‖
2
(5)
 
that represents the assignment for users in user group   in
 . By concatenating the assignment vectors for each user
group, we form a certain number of candidate assignment
matrixes that guarantee the 
constraints in column. From
all these candidates, the one that minimizes the objective
function in Equation (6) is defined as  
 
= argmin ∑=1
∑
=1
( ∑ ) ‖   
=1

,
−  (
 
where    
group</p>
        <p>are the j-view features of user   who is in

. Then the global cluster assignment   for user
  in user group   is regarded as  (
  )
.
 Fix ,   ,   a, and update global and local cluster
  )</p>
        <p>‖
(6)
2
mapping matrix  
  is the mapping matrix between global and local clusters.
For each view, based on the constraints for   , we construct
candidate mapping matrixes and possible choices for the
local cluster assignment by transforming from the global
cluster assignment  . The one that assigns users to the best
local clusters to guarantee the overall minimized distance
over all the users is selected to be the updated mapping matrix.
 Fix ,   ,   and update</p>
        <p>is introduced to aid solving the optimization problem in</p>
      </sec>
      <sec id="sec-5-3">
        <title>Equation (4) and it can be calculated directly from ,</title>
        <p>according to Equations (3).</p>
        <p>Of the four steps in CMIRC iterations, three are convex
problems related to one variable. It can be proved that each is
guaranteed to converge to an optimal solution. Once the
global clusters are ready, we select the labels of the users who

 =1
 
  = argmin ∑ ‖   −    
   ‖
2
(7)
 ,  
are constrained by Same-Cluster as the influence roles of
these clusters.
3</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Experiments and Discussion</title>
      <sec id="sec-6-1">
        <title>Four topics about well-known electronic products, “iPhone”,</title>
        <p>“Samsung Galaxy”, “Xbox” and “PlayStation” are selected
to construct the experimental datasets. We collect the tweets
that contain the topical word like “iPhone” from 3rd to 30th
April 2014. Among users who post these tweets, the ones
who have more than 500 followers and have been re-tweeted
at least once are regarded as influential users. The size of an
influential user pool ranges from 4912 (for Samsung Galaxy)
to 90906 (for iPhone). To be consistent, 4912 influential users
are sampled for each topic. These users together with their
tweets and account information are used in the experiments.</p>
        <p>Due to the lack of annotated datasets, for each topic we
randomly select 200 from 4912 influential users and invite
human annotators to label their influence roles for evaluation
purpose
by
providing
users’
posts and their account
information. The numbers of the annotated users across five
influence roles are presented in Table 2. We randomly choose</p>
      </sec>
      <sec id="sec-6-2">
        <title>1/5 users of each influence role to build the constraints</title>
        <p>required by CMIRC, and the rest are used for evaluation.</p>
        <sec id="sec-6-2-1">
          <title>CMIRC</title>
        </sec>
        <sec id="sec-6-2-2">
          <title>MIRC</title>
          <p>For another parameter   , it is set to make all single views
have balanced contributions to the final clustering results. We
compute   based on the average 2 -norm distance, i.e., 
 ,
between a user and all other users in view j.   is negatively
related to   . That is,
  = ∑
 =1 ∑ = +1‖   −    ‖2

(8)
and
 1
1 =  2
2 =  3</p>
          <p>3
3,  .  . ∑ =1   = 1</p>
          <p>This gives us (0.177, 0.621, 0.202), (0.086, 0.588, 0.326),
(0.093, 0.604, 0.303) and (0.180, 0.618, 0.202) for the topics
“iPhone”, “Samsung Galaxy, “Xbox” and “PlayStation”. The
parameters</p>
          <p>for CMIRC on two-view clustering are set
analogously. The parameters used in MKC and NMFMC to
balance the relative weights among different views are also
turned for their best performance. The constraints in all the
constrained approaches are used in the same way. We assign
the labels
corresponding
of constrained
users as the
roles
of the
clusters
for all
constrained
clustering
approaches. For BKC, MKC and NMFMC, we choose the
assignment that maximizes the MF as the mapping of the
clusters to the influence roles. We repeat the experiments for
all the approaches 10 times using random initialization and
present their average performance in the Table 3. The
performance of the proposed CMIRC consistently beat all
others in all three metrics.</p>
        </sec>
      </sec>
      <sec id="sec-6-3">
        <title>Besides, we note that all multi-view clustering approaches</title>
        <p>outperform the baseline BKC, and CMIRC beats the CKC. It
demonstrates the power of multi-view clustering approaches
and verifies that representing data in different views actually
works for influence role detection. However, comparing
different multi-view clustering approaches, CMIRC and even
MIRC without constraints get more accurate results. It proves
the rationality of our assumption that each view can only
represent
partial information,
and
by
employing
the
insufficient views together, we infer better global clustering
results. Meanwhile, we also see that CMIRC performs better
than MIRC that lacks of prior knowledge, which proves that
building appropriate constraints to
model the different
influence role demands from a company is important.</p>
      </sec>
      <sec id="sec-6-4">
        <title>Moreover, By comparing constrained clustering approaches</title>
        <p>with single-view, two-view, and three-view, we observe that
the performance gets better when more views are involved. It
shows that the three views including topic, sentiment and
popularity views are all necessary to identify influence roles.</p>
      </sec>
      <sec id="sec-6-5">
        <title>At last, in three single-view constrained K-means clustering</title>
        <p>approaches, it is difficult to distinguish which view is better.
However,
when
compare
three
two-view
constrained
clustering approaches, we find that the combination of the
topic view and the popularity view
performs the best,
followed by the combination of the sentiment view and the
popularity view. The importance of user’s popularity in
identifying influence roles is clear. Meanwhile, topic view
and sentiment view are still important and necessary to
supplement the popularity view.</p>
        <p>To provide a more intuitive understanding of what are the
users with each influence role look like, we provide the
cluster centers to illustrate the characteristics of each role in
each view in Tables 4 to 6. We present the five most
representative (popular) words used by the users in each role
and the ratio of average positive score and positive score of
all the users belong to the same role. The ratio is bigger if in
general people are more positive. We also give the average
numbers of followers and followees, and the percentage of
the verified accounts for reference. The general feelings from
the topic view analysis are (1) enthusiasts and celebrities tend
to share their own experiences and assessments with the
words like “buy” and “love”; (2) experts who care more about
specific aspects like to mention the detailed words such as
“charger” and “battery”; (3) the general words like “news”
and “mobile” are often used by information disseminators
who pass the latest news to people. From the sentiment view
analysis, we do observe a significant trend that in general
enthusiasts express
more
positively
while information
disseminators hold more neutral sentiment. We can also see
that the popularity of celebrity is pretty high and it alone is
able to pick out celebrities easily.
4</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>Conclusion</title>
      <sec id="sec-7-1">
        <title>In this work, we address the issue of influence role detection.</title>
        <p>constraints are used to model the prior information. The
results indicate the effectiveness of our proposed approach.</p>
      </sec>
      <sec id="sec-7-2">
        <title>In the future, we will continue to explore more features to capture their actual marketing effects on their followers.</title>
        <p>Expert
news, apple, charger, battery, selling
fingerprint, android, 5s, tech, launch
white, china, flaw, security, sales
sales, code, confirm, communiyy, console
sentiment</p>
        <p>Topic
Positive
Negative</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>Acknowledgments</title>
      <sec id="sec-8-1">
        <title>The work described in this paper was supported by the grants</title>
        <p>from the Research Grants Council of Hong Kong (PolyU
5202/12E and PolyU 152094/14E) and a grant from the</p>
      </sec>
      <sec id="sec-8-2">
        <title>National Natural Science Foundation of China (61272291).</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [Anagnostopoulos et al.,
          <year>2008</year>
          ]
          <string-name>
            <given-names>Anagnostopoulos</given-names>
            <surname>Aris</surname>
          </string-name>
          , Ravi Kumar, and
          <string-name>
            <given-names>Mohammad</given-names>
            <surname>Mahdian</surname>
          </string-name>
          .
          <article-title>Influence and correlation in social networks</article-title>
          .
          <source>In SIGKDD 2008</source>
          . pages
          <fpage>7</fpage>
          -
          <lpage>15</lpage>
          . ACM,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [Bickel et al.,
          <year>2004</year>
          ]
          <article-title>Bickel Steffen and Tobias Scheffe. Multi-View Clustering</article-title>
          .
          <source>In ICDM 2004</source>
          , pages
          <fpage>19</fpage>
          -
          <lpage>26</lpage>
          . IEEE,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <source>[Brown and Hayes</source>
          , 2008]
          <string-name>
            <given-names>Brown D</given-names>
            and
            <surname>Hayes</surname>
          </string-name>
          , N. Brown, Duncan, and
          <string-name>
            <given-names>Nick</given-names>
            <surname>Hayes</surname>
          </string-name>
          .
          <source>Influencer Marketing: Who Really Influences Your Customers? ButterworthHeinemann</source>
          , Oxford.
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [Cai et al.,
          <year>2013</year>
          ]
          <string-name>
            <given-names>Cai</given-names>
            <surname>Xiao</surname>
          </string-name>
          , Feiping Nie, and
          <article-title>Heng Huang. Multi-view K-means Clustering on Big Data</article-title>
          .
          <source>In IJCAI 2013</source>
          , pages
          <fpage>2598</fpage>
          -
          <lpage>2604</lpage>
          . AAAI Press,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [Cha et al.,
          <year>2010</year>
          ]
          <string-name>
            <given-names>Cha</given-names>
            <surname>Meeyoung</surname>
          </string-name>
          , Haddadi Hamed, Benevenuto, Fabrıcio, Gummadi Krishna P.
          <article-title>Measuring User Influence in Twitter: The Million Follower Fallacy</article-title>
          .
          <source>In ICWSM 2010</source>
          , pages
          <fpage>10</fpage>
          -
          <lpage>17</lpage>
          . AAAI Press,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [Chen et al.,
          <year>2009</year>
          ]
          <string-name>
            <given-names>Wei</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Yajun</given-names>
            <surname>Wang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Siyu</given-names>
            <surname>Yang</surname>
          </string-name>
          .
          <article-title>Efficient influence maximization in social networks</article-title>
          .
          <source>In SIGKDD 2009</source>
          , pages
          <fpage>199</fpage>
          -
          <lpage>208</lpage>
          . ACM,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [Chen et al.,
          <year>2014</year>
          ]
          <string-name>
            <given-names>Chengyao</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Dehong</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Wenjie</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Yuexian</given-names>
            <surname>Hou</surname>
          </string-name>
          .
          <article-title>"Inferring topic-dependent influence roles of Twitter users."</article-title>
          <source>In SIGIR 2014</source>
          , pages
          <fpage>1203</fpage>
          -
          <lpage>1206</lpage>
          ACM,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [Kempe et al.,
          <year>2003</year>
          ]
          <string-name>
            <given-names>Kempe</given-names>
            <surname>David</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Jon</given-names>
            <surname>Kleinberg</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Éva</given-names>
            <surname>Tardos</surname>
          </string-name>
          .
          <article-title>Maximizing the spread of influence through a social network</article-title>
          .
          <source>In SIGKDD 2003</source>
          , pages
          <fpage>137</fpage>
          -
          <lpage>146</lpage>
          . ACM,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [Law et al.,
          <year>2004</year>
          ]
          <string-name>
            <given-names>Law</given-names>
            <surname>Martin</surname>
          </string-name>
          <string-name>
            <given-names>HC</given-names>
            ,
            <surname>Alexander</surname>
          </string-name>
          <string-name>
            <given-names>Topchy</given-names>
            , and
            <surname>Anil</surname>
          </string-name>
          <string-name>
            <given-names>K.</given-names>
            <surname>Jain</surname>
          </string-name>
          .
          <article-title>Clustering with Soft and Group Constraints</article-title>
          . In Structural, Syntactic, and Statistical Pattern Recognition, pages
          <fpage>662</fpage>
          -
          <lpage>670</lpage>
          .
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [Liu et al.,
          <year>2013</year>
          ]
          <string-name>
            <given-names>Liu</given-names>
            <surname>Jialu</surname>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            <given-names>Chi</given-names>
          </string-name>
          ,
          <article-title>Gao Jing and Han Jiawei. Multi-view Clustering via Joint Nonnegative Matrix Factorization</article-title>
          .
          <source>In SIAM 2013</source>
          , pages
          <fpage>252</fpage>
          -
          <lpage>260</lpage>
          .
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [Weng et al.,
          <year>2010</year>
          ]
          <string-name>
            <given-names>Weng</given-names>
            <surname>Jianshu</surname>
          </string-name>
          ,
          <string-name>
            <surname>Lim</surname>
          </string-name>
          Ee-Peng,
          <article-title>Jiang Jing and He Qi</article-title>
          .
          <article-title>TwitterRank: Finding Topic-sensitive Influential Twitterers</article-title>
          .
          <source>In ICWSM 2010</source>
          , pages
          <fpage>261</fpage>
          -
          <lpage>270</lpage>
          . ACM,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>