{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:39:24Z","timestamp":1743093564400,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030594183"},{"type":"electronic","value":"9783030594190"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59419-0_8","type":"book-chapter","created":{"date-parts":[[2020,9,21]],"date-time":"2020-09-21T16:57:43Z","timestamp":1600707463000},"page":"120-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["STIM: Scalable Time-Sensitive Influence Maximization in Large Social Networks"],"prefix":"10.1007","author":[{"given":"Yuanyuan","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Kailin","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Lijia","family":"Wei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,22]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Huttenlocher, D., Kleinberg, J., Lan, X.: Group formation in large social networks: membership, growth, and evolution. In: KDD, pp. 44\u201354 (2006)","DOI":"10.1145\/1150402.1150412"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Bakshy, E., Eckles, D., Yan, R., Rosenn, I.: Social influence in social advertising: evidence from field experiments. In: CEC, pp. 146\u2013161 (2012)","DOI":"10.1145\/2229012.2229027"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Bakshy, E., Hofman, J.M., Mason, W.A., Watts, D.J.: Everyone\u2019s an influencer: quantifying influence on Twitter. In: WSDM, pp. 65\u201374 (2011)","DOI":"10.1145\/1935826.1935845"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Borgs, C., Brautbar, M., Chayes, J., Lucier, B.: Maximizing social influence in nearly optimal time. In: SODA, pp. 946\u2013957 (2014)","DOI":"10.1137\/1.9781611973402.70"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Chen, W., Lakshmanan, L.V.S., Castillo, C.: Information and Influence Propagation in Social Networks. Synthesis Lectures on Data Management (2013)","DOI":"10.1007\/978-3-031-01850-3"},{"key":"8_CR6","unstructured":"Chen, W., Lu, W., Zhang, N.: Time-critical influence maximization in social networks with time-delayed diffusion process. In: AAAI (2012)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: KDD, pp. 1029\u20131038 (2010)","DOI":"10.1145\/1835804.1835934"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Domingos, P., Richardson, M.: Mining the network value of customers. In: KDD, pp. 57\u201366 (2001)","DOI":"10.1145\/502512.502525"},{"key":"8_CR9","unstructured":"Du, N., Song, L., Gomez-Rodriguez, M., Zha, H.: Scalable influence estimation in continuous-time diffusion networks. In: NIPS, pp. 3147\u20133155 (2013)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Galhotra, S., Arora, A., Roy, S.: Holistic influence maximization: combining scalability and efficiency with opinion-aware models. In: SIGMOD, pp. 743\u2013758 (2016)","DOI":"10.1145\/2882903.2882929"},{"key":"8_CR11","unstructured":"Gomez-Rodriguez, M., Balduzzi, D., Sch\u00f6lkopf, B.: Uncovering the temporal dynamics of diffusion networks. In: ICML, pp. 561\u2013568 (2011)"},{"key":"8_CR12","unstructured":"Gomez-Rodriguez, M., Sch\u00f6lkopf, B.: Influence maximization in continuous time diffusion networks. In: ICML (2012)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Gomez-Rodriguez, M., Song, L., Du, N., Zha, H., Sch\u00f6lkopf, B.: Influence estimation and maximization in continuous-time diffusion networks. TIS 34(2), 9:1\u20139:33 (2016)","DOI":"10.1145\/2824253"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Goyal, A., Lu, W., Lakshmanan, L.V.S.: CELF++: optimizing the greedy algorithm for influence maximization in social networks. In: WWW, pp. 47\u201348 (2011)","DOI":"10.1145\/1963192.1963217"},{"issue":"9","key":"8_CR15","first-page":"913","volume":"10","author":"K Huang","year":"2017","unstructured":"Huang, K., Wang, S., Bevilacqua, G.S., Xiao, X., Lakshmanan, L.V.S.: Revisiting the stop-and-stare algorithms for influence maximization. PVLDB 10(9), 913\u2013924 (2017)","journal-title":"PVLDB"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Jung, K., Heo, W., Chen, W.: IRIE: scalable and robust influence maximization in social networks. In: ICDM, pp. 918\u2013923 (2012)","DOI":"10.1109\/ICDM.2012.79"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: KDD, pp. 137\u2013146 (2003)","DOI":"10.1145\/956750.956769"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Lee, W., Kim, J., Yu, H.: CT-IC: continuously activated and time-restricted independent cascade model for viral marketing. In: ICDM, pp. 960\u2013965 (2012)","DOI":"10.1109\/ICDM.2012.40"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: KDD, pp. 420\u2013429 (2007)","DOI":"10.1145\/1281192.1281239"},{"key":"8_CR20","unstructured":"Li, J., Cai, Z., Yan, M., Li, Y.: Using crowdsourced data in location-based social networks to explore influence maximization. In: INFOCOM, pp. 1\u20139 (2016)"},{"issue":"10","key":"8_CR21","first-page":"1852","volume":"30","author":"Y Li","year":"2018","unstructured":"Li, Y., Fan, J., Wang, Y., Tan, K.: Influence maximization on social graphs: a survey. TKDE 30(10), 1852\u20131872 (2018)","journal-title":"TKDE"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Liu, B., Cong, G., Xu, D., Zeng, Y.: Time constrained influence maximization in social networks. In: ICDM, pp. 439\u2013448 (2012)","DOI":"10.1109\/ICDM.2012.158"},{"issue":"8","key":"8_CR23","first-page":"1904","volume":"26","author":"B Liu","year":"2014","unstructured":"Liu, B., Cong, G., Zeng, Y., Xu, D., Chee, Y.M.: Influence spreading path and its application to the time constrained social influence maximization problem and beyond. TKDE 26(8), 1904\u20131917 (2014)","journal-title":"TKDE"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Nguyen, H.T., Thai, M.T., Dinh, T.N.: Stop-and-stare: optimal sampling algorithms for viral marketing in billion-scale networks. In: SIGMOD, pp. 695\u2013710 (2016)","DOI":"10.1145\/2882903.2915207"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Rashid, A.M., Karypis, G., Riedl, J.: Influence in ratings-based recommender systems: an algorithm-independent approach. In: SDM, pp. 556\u2013560 (2005)","DOI":"10.1137\/1.9781611972757.60"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Sakaki, T., Okazaki, M., Matsuo, Y.: Earthquake shakes Twitter users: teal-time event detection by social sensors. In: WWW, pp. 851\u2013860 (2010)","DOI":"10.1145\/1772690.1772777"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Song, C., Hsu, W., Lee, M.: Targeted influence maximization in social networks. In: CIKM, pp. 1683\u20131692 (2016)","DOI":"10.1145\/2983323.2983724"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Sun, L., Huang, W., Yu, P.S., Chen, W.: Multi-round influence maximization. In: KDD, pp. 2249\u20132258 (2018)","DOI":"10.1145\/3219819.3220101"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Tang, J., Tang, X., Xiao, X., Yuan, J.: Online processing algorithms for influence maximization. In: SIGMOD, pp. 991\u20131005 (2018)","DOI":"10.1145\/3183713.3183749"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Tang, Y., Shi, Y., Xiao, X.: Influence maximization in near-linear time: a martingale approach. In: SIGMOD, pp. 1539\u20131554 (2015)","DOI":"10.1145\/2723372.2723734"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Tang, Y., Xiao, X., Shi, Y.: Influence maximization: near-optimal time complexity meets practical efficiency. In: SIGMOD, pp. 75\u201386 (2014)","DOI":"10.1145\/2588555.2593670"},{"issue":"3","key":"8_CR32","first-page":"599","volume":"29","author":"X Wang","year":"2017","unstructured":"Wang, X., Zhang, Y., Zhang, W., Lin, X.: Efficient distance-aware influence maximization in geo-social networks. TKDE 29(3), 599\u2013612 (2017)","journal-title":"TKDE"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Yuan, J., Tang, S.: No time to observe: adaptive influence maximization with partial feedback. In: IJCAI, pp. 3908\u20133914 (2017)","DOI":"10.24963\/ijcai.2017\/546"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59419-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T17:50:59Z","timestamp":1710265859000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-59419-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030594183","9783030594190"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59419-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/db.pknu.ac.kr\/dasfaa2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"487","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"119","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.11","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.81","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15 demo papers and 4 industrial papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}