{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:21:34Z","timestamp":1743038494400,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319340982"},{"type":"electronic","value":"9783319340999"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-34099-9_8","type":"book-chapter","created":{"date-parts":[[2016,4,27]],"date-time":"2016-04-27T18:40:35Z","timestamp":1461782435000},"page":"120-134","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Methods for Selecting Nodes for Maximal Spread of Influence in Recommendation Services"],"prefix":"10.1007","author":[{"given":"Bogdan","family":"Gliwa","sequence":"first","affiliation":[]},{"given":"Anna","family":"Zygmunt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,28]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Bhagat, S., Goyal, A., Lakshmanan, L.V.: Maximizing product adoption in social networks. In: Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, pp. 603\u2013612. ACM, New York (2012)","DOI":"10.1145\/2124295.2124368"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Chen, W., Collins, A., Cummings, R., Ke, T., Liu, Z., Rinc\u00f3n, D., Sun, X., Wang, Y., Wei, W., Yuan, Y.: Influence maximization in social networks when negative opinions may emerge and propagate. In: Proceedings of the Eleventh International Conference on Data Mining, SDM 2011, Mesa, Arizona, USA, 28\u201330 April 2011, pp. 379\u2013390 (2011)","DOI":"10.1137\/1.9781611972818.33"},{"issue":"3","key":"8_CR3","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/s10115-012-0540-7","volume":"33","author":"YC Chen","year":"2012","unstructured":"Chen, Y.C., Peng, W.C., Lee, S.Y.: Efficient algorithms for influence maximization in social networks. Knowl. Inf. Syst. 33(3), 577\u2013601 (2012). http:\/\/dx.org\/10.1007\/s10115-012-0540-7","journal-title":"Knowl. Inf. Syst."},{"issue":"5","key":"8_CR4","doi-asserted-by":"publisher","first-page":"591","DOI":"10.2501\/S1470785308200055","volume":"50","author":"D Eccleston","year":"2008","unstructured":"Eccleston, D., Griseri, L.: How does web 2.0 stretch traditional influencing patterns. Int. J. Mark. Res. 50(5), 591\u2013616 (2008)","journal-title":"Int. J. Mark. Res."},{"issue":"3","key":"8_CR5","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"LC Freeman","year":"1979","unstructured":"Freeman, L.C.: Centrality in social networks conceptual clarification. Soc. Netw. 1(3), 215\u2013239 (1979)","journal-title":"Soc. Netw."},{"issue":"4","key":"8_CR6","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1287\/mksc.1080.0444","volume":"28","author":"D Godes","year":"2009","unstructured":"Godes, D., Mayzlin, D.: Firm-created word-of-mouth communication: evidence from a field test. Mark. Sci. 28(4), 721\u2013739 (2009)","journal-title":"Mark. Sci."},{"issue":"1","key":"8_CR7","doi-asserted-by":"publisher","first-page":"73","DOI":"10.14778\/2047485.2047492","volume":"5","author":"A Goyal","year":"2011","unstructured":"Goyal, A., Bonchi, F., Lakshmanan, L.V.S.: A data-based approach to social influence maximization. Proc. VLDB Endow. 5(1), 73\u201384 (2011)","journal-title":"Proc. VLDB Endow."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Jamali, M., Ester, M.: A matrix factorization technique with trust propagation for recommendation in social networks. In: Proceedings of the Fourth ACM Conference on Recommender Systems, pp. 135\u2013142. ACM, New York (2010)","DOI":"10.1145\/1864708.1864736"},{"key":"8_CR9","volume-title":"Personal Influence: The Part Played by People in the Flow of Mass Communications","author":"E Katz","year":"2005","unstructured":"Katz, E., Lazarsfeld, P.: Personal Influence: The Part Played by People in the Flow of Mass Communications. Transaction Publishers, New Brunswick (2005)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146. ACM (2003)","DOI":"10.1145\/956750.956769"},{"issue":"834","key":"8_CR11","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1098\/rspa.1932.0171","volume":"138","author":"WO Kermack","year":"1932","unstructured":"Kermack, W.O., McKendrick, A.G.: Contributions to the mathematical theory of epidemics-II. The problem of endemicity. Proc. Roy. Soc. London Math. Phys. Eng. Sci. 138(834), 55\u201383 (1932)","journal-title":"Proc. Roy. Soc. London Math. Phys. Eng. Sci."},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-642-21786-9_40","volume-title":"Pattern Recognition and Machine Intelligence","author":"S Kundu","year":"2011","unstructured":"Kundu, S., Murthy, C.A., Pal, S.K.: A new centrality measure for influence maximization in social networks. In: Kuznetsov, S.O., Mandal, D.P., Kundu, M.K., Pal, S.K. (eds.) PReMI 2011. LNCS, vol. 6744, pp. 242\u2013247. Springer, Heidelberg (2011)"},{"issue":"1","key":"8_CR13","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1037\/h0057189","volume":"46","author":"HJ Leavitt","year":"1951","unstructured":"Leavitt, H.J.: Some effects of certain communication patterns on group performance. J. Abnorm. Soc. Psychol. 46(1), 38 (1951)","journal-title":"J. Abnorm. Soc. Psychol."},{"key":"8_CR14","unstructured":"Lovasz, L.: Random walks on graphs: A survey (1993)"},{"issue":"1","key":"8_CR15","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/TASE.2010.2052042","volume":"8","author":"R Narayanam","year":"2011","unstructured":"Narayanam, R., Narahari, Y.: A shapley value-based approach to discover influential nodes in social networks. IEEE Trans. Autom. Sci. Eng. 8(1), 130\u2013147 (2011)","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Niemczura, B., Gliwa, B., Zygmunt, A.: Linear threshold behavioral model for the spread of influence in recommendation services. In: The Second European Network Intelligence Conference, ENIC 2015, pp. 98\u2013105 (2015)","DOI":"10.1109\/ENIC.2015.22"},{"key":"8_CR17","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: Bringing order to the web (1999)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Zafarani, R., Abbasi, M.A., Liu, H.: Influence and homophily. In: Zafarani, R., Abbasi, M.A., Liu, H. (eds.) Social Media Mining. Cambridge University Press (2014)","DOI":"10.1017\/CBO9781139088510"},{"key":"8_CR19","unstructured":"Ryan, B., Gross, N.C.: Acceptance and diffusion of hybrid corn seed in two Iowa communities, vol. 372. Agricultural Experiment Station, Iowa State College of Agriculture and Mechanic Arts (1950)"},{"issue":"1","key":"8_CR20","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1080\/00223980.1954.9712925","volume":"38","author":"ME Shaw","year":"1954","unstructured":"Shaw, M.E.: Group structure and the behavior of individuals in small groups. J. Psychol. 38(1), 139\u2013149 (1954)","journal-title":"J. Psychol."},{"key":"8_CR21","unstructured":"Wei, L., Laks, V.S.: Profit maximization over social networks. CoRR abs\/1210.4211 (2012)"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Zhuang, H., Sun, Y., Tang, J., Zhang, J., Sun, X.: Influence maximization in dynamic social networks. In: 2013 IEEE 13th International Conference on Data Mining (ICDM), pp. 1313\u20131318, December 2013","DOI":"10.1109\/ICDM.2013.145"}],"container-title":["Communications in Computer and Information Science","Beyond Databases, Architectures and Structures. Advanced Technologies for Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-34099-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,18]],"date-time":"2022-06-18T22:28:20Z","timestamp":1655591300000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-34099-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319340982","9783319340999"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-34099-9_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"28 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}