{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:57:00Z","timestamp":1743145020830,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030653460"},{"type":"electronic","value":"9783030653477"}],"license":[{"start":{"date-parts":[[2020,12,20]],"date-time":"2020-12-20T00:00:00Z","timestamp":1608422400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,12,20]],"date-time":"2020-12-20T00:00:00Z","timestamp":1608422400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-65347-7_36","type":"book-chapter","created":{"date-parts":[[2020,12,19]],"date-time":"2020-12-19T07:03:42Z","timestamp":1608361422000},"page":"432-443","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Learning Vaccine Allocation from Simulations"],"prefix":"10.1007","author":[{"given":"Gerrit","family":"Gro\u00dfmann","sequence":"first","affiliation":[]},{"given":"Michael","family":"Backenk\u00f6hler","sequence":"additional","affiliation":[]},{"given":"Jonas","family":"Klesen","sequence":"additional","affiliation":[]},{"given":"Verena","family":"Wolf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,20]]},"reference":[{"issue":"2","key":"36_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.mbs.2009.12.003","volume":"224","author":"F Ball","year":"2010","unstructured":"Ball, F., Sirl, D., Trapman, P.: Analysis of a stochastic sir epidemic on a random network incorporating household structure. Math. Biosci. 224(2), 53\u201373 (2010)","journal-title":"Math. Biosci."},{"key":"36_CR2","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.cpc.2017.06.007","volume":"219","author":"W Cota","year":"2017","unstructured":"Cota, W., Ferreira, S.C.: Optimized Gillespie algorithms for the simulation of Markovian epidemic processes on large and heterogeneous networks. Comput. Phys. Commun. 219, 303\u2013312 (2017)","journal-title":"Comput. Phys. Commun."},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Gan, C., Yang, X., Liu, W., Zhu, Q., Zhang, X.: Propagation of computer virus under human intervention: a dynamical model. Discrete Dynam. Natu. Soc. 2012 (2012)","DOI":"10.1155\/2012\/106950"},{"issue":"6","key":"36_CR4","doi-asserted-by":"publisher","first-page":"061921","DOI":"10.1103\/PhysRevE.81.061921","volume":"81","author":"A Goltsev","year":"2010","unstructured":"Goltsev, A., De Abreu, F., Dorogovtsev, S., Mendes, J.: Stochastic cellular automata model of neural networks. Phys. Rev. E 81(6), 061921 (2010)","journal-title":"Phys. Rev. E"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Grossmann, G., Backenk\u00f6hler, M., Wolf, V.: Importance of interaction structure and stochasticity for epidemic spreading: a covid-19 case study. ResearchGate (2020). https:\/\/www.researchgate.net\/publication\/341119247_Importance_of_Interaction_Structure_and_Stochasticity_for_Epidemic_Spreading_A_COVID-19_Case_Study","DOI":"10.1101\/2020.05.05.20091736"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Gro\u00dfmann, G., Wolf, V.: Rejection-based simulation of stochastic spreading processes on complex networks. In: International Workshop on Hybrid Systems Biology, pp. 63\u201379. Springer (2019)","DOI":"10.1007\/978-3-030-28042-0_5"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Jeh, G., Widom, J.: Scaling personalized web search. In: Proceedings of the 12th International Conference on World Wide Web, pp. 271\u2013279 (2003)","DOI":"10.1145\/775152.775191"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Khurana, P., Kumar, D.: Sir model for fake news spreading through whatsapp. In: Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), pp. 26\u201327 (2018)","DOI":"10.2139\/ssrn.3166095"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Kiss, I.Z., Miller, J.C., Simon, P.L., et al.: Mathematics of Epidemics on Networks. vol. 598. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-50806-1"},{"issue":"11","key":"36_CR10","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1038\/nphys1746","volume":"6","author":"M Kitsak","year":"2010","unstructured":"Kitsak, M., Gallos, L.K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H.E., Makse, H.A.: Identification of influential spreaders in complex networks. Nat. Phys. 6(11), 888 (2010)","journal-title":"Nat. Phys."},{"issue":"46","key":"36_CR11","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1098\/rsif.2009.0359","volume":"7","author":"RM May","year":"2009","unstructured":"May, R.M., Arinaminpathy, N.: Systemic risk: the dynamics of model banking systems. J. R. Soc. Interface 7(46), 823\u2013838 (2009)","journal-title":"J. R. Soc. Interface"},{"issue":"1","key":"36_CR12","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCS.2015.2495000","volume":"36","author":"C Nowzari","year":"2016","unstructured":"Nowzari, C., Preciado, V.M., Pappas, G.J.: Analysis and control of epidemics: a survey of spreading processes on complex networks. IEEE Control Syst. Mag. 36(1), 26\u201346 (2016)","journal-title":"IEEE Control Syst. Mag."},{"key":"36_CR13","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: bringing order to the web. Technical report 1999-66, Stanford InfoLab, November 1999. http:\/\/ilpubs.stanford.edu:8090\/422\/, previous number = SIDL-WP-1999-0120"},{"issue":"3","key":"36_CR14","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s10115-012-0520-y","volume":"33","author":"BA Prakash","year":"2012","unstructured":"Prakash, B.A., Chakrabarti, D., Valler, N.C., Faloutsos, M., Faloutsos, C.: Threshold conditions for arbitrary cascade models on arbitrary networks. Knowl. Inf. Syst. 33(3), 549\u2013575 (2012)","journal-title":"Knowl. Inf. Syst."},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Prakash, B.A., Tong, H., Valler, N., Faloutsos, M., Faloutsos, C.: Virus propagation on time-varying networks: theory and immunization algorithms. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 99\u2013114. Springer (2010)","DOI":"10.1007\/978-3-642-15939-8_7"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Sambaturu, P., Vullikanti, A.: Designing robust interventions to control epidemic outbreaks. In: International Conference on Complex Networks and Their Applications, pp. 469\u2013480. Springer (2019)","DOI":"10.1007\/978-3-030-36687-2_39"},{"issue":"6","key":"36_CR17","doi-asserted-by":"publisher","first-page":"061911","DOI":"10.1103\/PhysRevE.84.061911","volume":"84","author":"CM Schneider","year":"2011","unstructured":"Schneider, C.M., Mihaljev, T., Havlin, S., Herrmann, H.J.: Suppressing epidemics with a limited amount of immunization units. Phys. Rev. E 84(6), 061911 (2011)","journal-title":"Phys. Rev. E"},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Song, C., Hsu, W., Lee, M.L.: Node immunization over infectious period. In: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, pp. 831\u2013840 (2015)","DOI":"10.1145\/2806416.2806522"},{"key":"36_CR19","first-page":"169","volume":"II","author":"G Stewart","year":"1975","unstructured":"Stewart, G., Miller, J.: Methods of simultaneous iteration for calculating eigenvectors of matrices. Top. Numer. Anal. II, 169\u2013185 (1975)","journal-title":"Top. Numer. Anal."},{"key":"36_CR20","doi-asserted-by":"crossref","unstructured":"Tong, H., Prakash, B.A., Tsourakakis, C., Eliassi-Rad, T., Faloutsos, C., Chau, D.H.: On the vulnerability of large graphs. In: 2010 IEEE International Conference on Data Mining, pp. 1091\u20131096. IEEE (2010)","DOI":"10.1109\/ICDM.2010.54"},{"key":"36_CR21","doi-asserted-by":"crossref","unstructured":"Wijayanto, A.W., Murata, T.: Flow-aware vertex protection strategy on large social networks. In: 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 58\u201363. IEEE (2017)","DOI":"10.1145\/3110025.3110033"},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Wijayanto, A.W., Murata, T.: Learning adaptive graph protection strategy on dynamic networks via reinforcement learning. In: 2018 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI), pp. 534\u2013539. IEEE (2018)","DOI":"10.1109\/WI.2018.00-41"},{"issue":"1","key":"36_CR23","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/s41109-019-0122-7","volume":"4","author":"AW Wijayanto","year":"2019","unstructured":"Wijayanto, A.W., Murata, T.: Effective and scalable methods for graph protection strategies against epidemics on dynamic networks. Appl. Netw. Sci. 4(1), 18 (2019)","journal-title":"Appl. Netw. Sci."},{"issue":"2","key":"36_CR24","first-page":"1","volume":"10","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., Prakash, B.A.: Data-aware vaccine allocation over large networks. ACM Trans. Knowl. Discov. Data (TKDD) 10(2), 1\u201332 (2015)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"}],"container-title":["Studies in Computational Intelligence","Complex Networks &amp; Their Applications IX"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-65347-7_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T00:46:21Z","timestamp":1670373981000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-65347-7_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,20]]},"ISBN":["9783030653460","9783030653477"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-65347-7_36","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2020,12,20]]},"assertion":[{"value":"20 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COMPLEX NETWORKS 2020","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Complex Networks and Their Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwcna2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.complexnetworks.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}