{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T03:47:43Z","timestamp":1772941663459,"version":"3.50.1"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319312033","type":"print"},{"value":"9783319312040","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31204-0_25","type":"book-chapter","created":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T07:24:40Z","timestamp":1458631480000},"page":"379-392","source":"Crossref","is-referenced-by-count":64,"title":["Influence Maximization in Social Networks with Genetic Algorithms"],"prefix":"10.1007","author":[{"given":"Doina","family":"Bucur","sequence":"first","affiliation":[]},{"given":"Giovanni","family":"Iacca","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,15]]},"reference":[{"issue":"4","key":"25_CR1","doi-asserted-by":"publisher","first-page":"105","DOI":"10.4086\/toc.2015.v011a004","volume":"11","author":"D Kempe","year":"2015","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. Theory Comput. 11(4), 105\u2013147 (2015)","journal-title":"Theory Comput."},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-39718-2_23","volume-title":"The Semantic Web - ISWC 2003","author":"M Richardson","year":"2003","unstructured":"Richardson, M., Agrawal, R., Domingos, P.: Trust management for the semantic web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 351\u2013368. Springer, Heidelberg (2003)"},{"key":"25_CR3","unstructured":"Leskovec, J., Krevl, A.: SNAP Datasets: Stanford large network dataset collection, October 2015. http:\/\/snap.stanford.edu\/data"},{"issue":"3","key":"25_CR4","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1023\/A:1011122126881","volume":"12","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg, J., Libai, B., Muller, E.: Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark. Lett. 12(3), 211\u2013223 (2001)","journal-title":"Mark. Lett."},{"issue":"3","key":"25_CR5","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/s10618-012-0262-1","volume":"25","author":"C Wang","year":"2012","unstructured":"Wang, C., Chen, W., Wang, Y.: Scalable influence maximization for independent cascade model in large-scale social networks. Data Min. Knowl. Disc. 25(3), 545\u2013576 (2012)","journal-title":"Data Min. Knowl. Disc."},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2009, pp. 199\u2013208. ACM, New York (2009)","DOI":"10.1145\/1557019.1557047"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Song, G., Cong, G., Wang, Y., Si, W., Xie, K.: Simulated annealing based influence maximization in social networks. In: Burgard, W., Roth, D. (eds.) AAAI. AAAI Press (2011)","DOI":"10.1609\/aaai.v25i1.7838"},{"key":"25_CR8","unstructured":"Garret, A.L.: Inspyred: A framework for creating bio-inspired computational intelligence algorithms in Python, October 2015. https:\/\/pypi.python.org\/pypi\/inspyred"},{"key":"25_CR9","first-page":"193","volume":"9","author":"BL Miller","year":"1995","unstructured":"Miller, B.L., Goldberg, D.E.: Genetic algorithms, tournament selection, and the effects of noise. Complex Syst. 9, 193\u2013212 (1995)","journal-title":"Complex Syst."},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.asoc.2013.12.002","volume":"16","author":"D Bucur","year":"2014","unstructured":"Bucur, D., Iacca, G., Squillero, G., Tonda, A.: The impact of topology on energy consumption for collection tree protocols: an experimental assessment through evolutionary computation. Appl. Soft Comput. 16, 210\u2013222 (2014)","journal-title":"Appl. Soft Comput."},{"key":"25_CR11","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.adhoc.2015.02.005","volume":"30","author":"D Bucur","year":"2015","unstructured":"Bucur, D., Iacca, G., de Boer, P.T.: Characterizing topological bottlenecks for data delivery in CTP using simulation-based stress testing with natural selection. Ad Hoc Netw. 30, 22\u201345 (2015)","journal-title":"Ad Hoc Netw."},{"key":"25_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/978-3-319-16549-3_3","volume-title":"Applications of Evolutionary Computation","author":"D Bucur","year":"2015","unstructured":"Bucur, D., Iacca, G., Squillero, G., Tonda, A.: Black holes and revelations: using evolutionary algorithms to uncover vulnerabilities in disruption-tolerant networks. In: Mora, A.M., Squillero, G. (eds.) EvoApplications 2015. LNCS, vol. 9028, pp. 29\u201341. Springer, Switzerland (2015)"},{"key":"25_CR13","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1016\/j.asoc.2015.11.024","volume":"40","author":"D Bucur","year":"2016","unstructured":"Bucur, D., Iacca, G., Gaudesi, M., Squillero, G., Tonda, A.: Optimizing groups of colluding strong attackers in mobile urban communication networks with evolutionary algorithms. Appl. Soft Comput. 40, 416\u2013426 (2016)","journal-title":"Appl. Soft Comput."}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31204-0_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,17]],"date-time":"2023-08-17T05:21:19Z","timestamp":1692249679000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31204-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319312033","9783319312040"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31204-0_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}