{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:23:46Z","timestamp":1742930626226,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030653460"},{"type":"electronic","value":"9783030653477"}],"license":[{"start":{"date-parts":[[2020,12,20]],"date-time":"2020-12-20T00:00:00Z","timestamp":1608422400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,12,20]],"date-time":"2020-12-20T00:00:00Z","timestamp":1608422400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-65347-7_32","type":"book-chapter","created":{"date-parts":[[2020,12,19]],"date-time":"2020-12-19T07:03:42Z","timestamp":1608361422000},"page":"382-394","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Influence Maximization for Dynamic Allocation in Voter Dynamics"],"prefix":"10.1007","author":[{"given":"Zhongqi","family":"Cai","sequence":"first","affiliation":[]},{"given":"Markus","family":"Brede","sequence":"additional","affiliation":[]},{"given":"Enrico","family":"Gerding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,20]]},"reference":[{"key":"32_CR1","doi-asserted-by":"publisher","first-page":"6337","DOI":"10.1109\/ACCESS.2018.2888895","volume":"7","author":"K Ali","year":"2018","unstructured":"Ali, K., Wang, C.Y., Chen, Y.S.: A novel nested q-learning method to tackle time-constrained competitive influence maximization. IEEE Access 7, 6337\u20136352 (2018)","journal-title":"IEEE Access"},{"unstructured":"Alshamsi, A., Pinheiro, F.L., Hidalgo, C.A.: When to target hubs? Strategic diffusion in complex networks. arXiv preprint arXiv:1705.00232 (2017)","key":"32_CR2"},{"issue":"3","key":"32_CR3","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1093\/comnet\/cny027","volume":"7","author":"M Brede","year":"2019","unstructured":"Brede, M., Restocchi, V., Stein, S.: Effects of time horizons on influence maximization in the voter dynamics. J. Complex Netw. 7(3), 445\u2013468 (2019)","journal-title":"J. Complex Netw."},{"doi-asserted-by":"crossref","unstructured":"Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th International Conference on World Wide Web, pp. 665\u2013674 (2011)","key":"32_CR4","DOI":"10.1145\/1963405.1963499"},{"doi-asserted-by":"crossref","unstructured":"Carnes, T., Nagarajan, C., Wild, S.M., Van\u00a0Zuylen, A.: Maximizing influence in a competitive social network: a follower\u2019s perspective. In: Proceedings of the Ninth International Conference on Electronic Commerce, pp. 351\u2013360 (2007)","key":"32_CR5","DOI":"10.1145\/1282100.1282167"},{"issue":"2","key":"32_CR6","doi-asserted-by":"publisher","first-page":"027103","DOI":"10.1103\/PhysRevE.71.027103","volume":"71","author":"M Catanzaro","year":"2005","unstructured":"Catanzaro, M., Bogun\u00e1, M., Pastor-Satorras, R.: Generation of uncorrelated random scale-free networks. Phys. Rev. E 71(2), 027103 (2005)","journal-title":"Phys. Rev. E"},{"issue":"4","key":"32_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2086737.2086741","volume":"5","author":"M Gomez-Rodriguez","year":"2012","unstructured":"Gomez-Rodriguez, M., Leskovec, J., Krause, A.: Inferring networks of diffusion and influence. ACM Trans. Knowl. Disc. Data (TKDD) 5(4), 1\u201337 (2012)","journal-title":"ACM Trans. Knowl. Disc. Data (TKDD)"},{"doi-asserted-by":"crossref","unstructured":"Goyal, A., Bonchi, F., Lakshmanan, L.V.: Learning influence probabilities in social networks. In: Proceedings of the Third ACM International Conference on Web Search and Data Mining, pp. 241\u2013250 (2010)","key":"32_CR8","DOI":"10.1145\/1718487.1718518"},{"issue":"2","key":"32_CR9","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s13278-012-0062-z","volume":"3","author":"A Goyal","year":"2013","unstructured":"Goyal, A., Bonchi, F., Lakshmanan, L.V., Venkatasubramanian, S.: On minimizing budget and time in influence propagation over social networks. Soc. Netw. Anal. Min. 3(2), 179\u2013192 (2013)","journal-title":"Soc. Netw. Anal. Min."},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.geb.2014.09.002","volume":"113","author":"S Goyal","year":"2019","unstructured":"Goyal, S., Heidari, H., Kearns, M.: Competitive contagion in networks. Games Econ. Behav. 113, 58\u201379 (2019)","journal-title":"Games Econ. Behav."},{"issue":"1","key":"32_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-017-00937-8","volume":"7","author":"J Jankowski","year":"2017","unstructured":"Jankowski, J., Br\u00f3dka, P., Kazienko, P., Szymanski, B.K., Michalski, R., Kajdanowicz, T.: Balancing speed and coverage by sequential seeding in complex networks. Sci. Rep. 7(1), 1\u201311 (2017)","journal-title":"Sci. Rep."},{"doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146 (2003)","key":"32_CR12","DOI":"10.1145\/956750.956769"},{"key":"32_CR13","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1016\/j.physa.2016.09.038","volume":"466","author":"MAMA Kermani","year":"2017","unstructured":"Kermani, M.A.M.A., Ardestani, S.F.F., Aliahmadi, A., Barzinpour, F.: A novel game theoretic approach for modeling competitive information diffusion in social networks with heterogeneous nodes. Phys. A 466, 570\u2013582 (2017)","journal-title":"Phys. A"},{"issue":"1","key":"32_CR14","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1177\/1524839911405850","volume":"14","author":"H Korda","year":"2013","unstructured":"Korda, H., Itani, Z.: Harnessing social media for health promotion and behavior change. Health Prom. Pract. 14(1), 15\u201323 (2013)","journal-title":"Health Prom. Pract."},{"unstructured":"Lindsay, B.R.: Social media and disasters: current uses, future options, and policy considerations (2011)","key":"32_CR15"},{"doi-asserted-by":"crossref","unstructured":"Liu, B., Cong, G., Xu, D., Zeng, Y.: Time constrained influence maximization in social networks. In: 2012 IEEE 12th International Conference on Data Mining, pp. 439\u2013448. IEEE (2012)","key":"32_CR16","DOI":"10.1109\/ICDM.2012.158"},{"issue":"3","key":"32_CR17","doi-asserted-by":"publisher","first-page":"033031","DOI":"10.1088\/1367-2630\/17\/3\/033031","volume":"17","author":"N Masuda","year":"2015","unstructured":"Masuda, N.: Opinion control in complex networks. New J. Phys. 17(3), 033031 (2015)","journal-title":"New J. Phys."},{"key":"32_CR18","doi-asserted-by":"publisher","first-page":"151208","DOI":"10.1109\/ACCESS.2020.3016913","volume":"8","author":"R Michalski","year":"2020","unstructured":"Michalski, R., Jankowski, J., Br\u00f3dka, P.: Effective influence spreading in temporal networks with sequential seeding. IEEE Access 8, 151208\u2013151218 (2020)","journal-title":"IEEE Access"},{"issue":"11","key":"32_CR19","doi-asserted-by":"publisher","first-page":"e78433","DOI":"10.1371\/journal.pone.0078433","volume":"8","author":"M Moussa\u00efd","year":"2013","unstructured":"Moussa\u00efd, M., K\u00e4mmer, J.E., Analytis, P.P., Neth, H.: Social influence and the collective dynamics of opinion formation. PLoS ONE 8(11), e78433 (2013)","journal-title":"PLoS ONE"},{"issue":"14","key":"32_CR20","doi-asserted-by":"publisher","first-page":"3200","DOI":"10.1103\/PhysRevLett.86.3200","volume":"86","author":"R Pastor-Satorras","year":"2001","unstructured":"Pastor-Satorras, R., Vespignani, A.: Epidemic spreading in scale-free networks. Phys. Rev. Lett. 86(14), 3200 (2001)","journal-title":"Phys. Rev. Lett."},{"unstructured":"Press, W., Teukolsky, S., Vetterling, W., Flannery, B.: Section 10.11. linear programming: interior-point methods. In: Numerical Recipes: The Art of Scientific Computing. Cambridge University Press (2007)","key":"32_CR21"},{"unstructured":"Press, W.H., Teukolsky, S.A., Vetterling, W.T., Flannery, B.P.: Numerical recipes in c (1988)","key":"32_CR22"},{"key":"32_CR23","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1126\/science.149.3683.510","volume":"30","author":"DJDS Price","year":"1965","unstructured":"Price, D.J.D.S.: Networks of scientific papers. Science 30, 510\u2013515 (1965)","journal-title":"Science"},{"key":"32_CR24","doi-asserted-by":"publisher","first-page":"10032","DOI":"10.1038\/srep10032","volume":"5","author":"M Ramos","year":"2015","unstructured":"Ramos, M., Shao, J., Reis, S.D., Anteneodo, C., Andrade, J.S., Havlin, S., Makse, H.A.: How does public opinion become extreme? Sci. Rep. 5, 10032 (2015)","journal-title":"Sci. Rep."},{"issue":"4","key":"32_CR25","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.crhy.2019.05.004","volume":"20","author":"S Redner","year":"2019","unstructured":"Redner, S.: Reality-inspired voter models: a mini-review. C.R. Phys. 20(4), 275\u2013292 (2019)","journal-title":"C.R. Phys."},{"issue":"1","key":"32_CR26","doi-asserted-by":"publisher","first-page":"016106","DOI":"10.1103\/PhysRevE.78.016106","volume":"78","author":"SW Son","year":"2008","unstructured":"Son, S.W., Jeong, H., Hong, H.: Relaxation of synchronization on complex networks. Phys. Rev. E 78(1), 016106 (2008)","journal-title":"Phys. Rev. E"},{"issue":"5","key":"32_CR27","doi-asserted-by":"publisher","first-page":"A60","DOI":"10.1016\/j.chb.2012.12.032","volume":"29","author":"PA Tess","year":"2013","unstructured":"Tess, P.A.: The role of social media in higher education classes (real and virtual)-a literature review. Comput. Hum. Behav. 29(5), A60\u2013A68 (2013)","journal-title":"Comput. Hum. Behav."},{"unstructured":"Weisstein, E.W.: Gershgorin circle theorem (2003)","key":"32_CR28"},{"unstructured":"Wilder, B., Vorobeychik, Y.: Controlling elections through social influence. In: Proceedings of the 17th International Conference on Autonomous Agents and Multiagent Systems, pp. 265\u2013273. International Foundation for Autonomous Agents and Multiagent Systems (2018)","key":"32_CR29"},{"issue":"6","key":"32_CR30","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1177\/0163443705057680","volume":"27","author":"C Woo-Young","year":"2005","unstructured":"Woo-Young, C.: Online civic participation, and political empowerment: online media and public opinion formation in Korea. Media Cult. Soc. 27(6), 925\u2013935 (2005)","journal-title":"Media Cult. Soc."},{"unstructured":"Zaichkowsky, J.L., Garkey, J.R.: Defending your brand against imitation: consumer behavior, marketing strategies, and legal issues. Quorum Books Westport, CT (1995)","key":"32_CR31"}],"container-title":["Studies in Computational Intelligence","Complex Networks &amp; Their Applications IX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-65347-7_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,19]],"date-time":"2020-12-19T20:14:34Z","timestamp":1608408874000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-65347-7_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,20]]},"ISBN":["9783030653460","9783030653477"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-65347-7_32","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2020,12,20]]},"assertion":[{"value":"20 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COMPLEX NETWORKS 2020","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Complex Networks and Their Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwcna2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.complexnetworks.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}