{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T08:40:53Z","timestamp":1766047253812,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319721491"},{"type":"electronic","value":"9783319721507"}],"license":[{"start":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T00:00:00Z","timestamp":1511740800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72150-7_35","type":"book-chapter","created":{"date-parts":[[2017,11,26]],"date-time":"2017-11-26T08:21:29Z","timestamp":1511684489000},"page":"426-436","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Seed Selection for Information Cascade in\u00a0Multilayer Networks"],"prefix":"10.1007","author":[{"given":"Fredrik","family":"Erlandsson","sequence":"first","affiliation":[]},{"given":"Piotr","family":"Br\u00f3dka","sequence":"additional","affiliation":[]},{"given":"Anton","family":"Borg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,27]]},"reference":[{"key":"35_CR1","doi-asserted-by":"publisher","unstructured":"Barab\u00e1si, A.L.: Network science. Philos. Trans. R. Soc. Lond. A Math. Phys. Eng. Sci. 371(1987) (2013). https:\/\/doi.org\/10.1098\/rsta.2012.0375","DOI":"10.1098\/rsta.2012.0375"},{"key":"35_CR2","unstructured":"Barab\u00e1si, A.L.: Network science. Cambridge university press (2016)"},{"key":"35_CR3","first-page":"1","volume":"7","author":"J Dem\u0161ar","year":"2006","unstructured":"Dem\u0161ar, J.: Statistical comparisons of classifiers over multiple data sets. J. Mach. Learn. Res. 7, 1\u201330 (2006)","journal-title":"J. Mach. Learn. Res."},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Dickison, M.E., Magnani, M., Rossi, L.: Multilayer social networks. Cambridge University Press (2016)","DOI":"10.1017\/CBO9781139941907"},{"key":"35_CR5","doi-asserted-by":"publisher","unstructured":"Erlandsson, F.: Replication data for: Do we really need to catch them all? a new user-guided social media crawling method (2017). https:\/\/doi.org\/10.7910\/DVN\/DCBDEP","DOI":"10.7910\/DVN\/DCBDEP"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Erlandsson, F., Br\u00f3dka, P., Boldt, M., Johnson, H.: Do we really need to catch them all? A new user-guided social media crawling method. CoRR abs\/1612.01734 (2016)","DOI":"10.3390\/e19120686"},{"issue":"5","key":"35_CR7","doi-asserted-by":"publisher","first-page":"164","DOI":"10.3390\/e18050164","volume":"18","author":"F Erlandsson","year":"2016","unstructured":"Erlandsson, F., Br\u00f3dka, P., Borg, A., Johnson, H.: Finding influential users in social media using association rule learning. Entropy 18(5), 164 (2016). https:\/\/doi.org\/10.3390\/e18050164","journal-title":"Entropy"},{"key":"35_CR8","doi-asserted-by":"publisher","unstructured":"Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD \u201903, pp. 137\u2013146. ACM, New York, NY, USA. https:\/\/doi.org\/10.1145\/956750.956769 . (2003)","DOI":"10.1145\/956750.956769"},{"issue":"11","key":"35_CR9","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1038\/nphys1746","volume":"6","author":"M Kitsak","year":"2010","unstructured":"Kitsak, M., Gallos, L.K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H.E., Makse, H.A.: Identification of influential spreaders in complex networks. Nat. Phys. 6(11), 888\u2013893 (2010). https:\/\/doi.org\/10.1038\/nphys1746","journal-title":"Nat. Phys."},{"key":"35_CR10","doi-asserted-by":"publisher","first-page":"59","DOI":"10.3389\/fphy.2015.00059","volume":"3","author":"E Omodei","year":"2015","unstructured":"Omodei, E., De Domenico, M., Arenas, A.: Characterizing interactions in online social networks during exceptional events. Front. Phys. 3, 59 (2015). https:\/\/doi.org\/10.3389\/fphy.2015.00059","journal-title":"Front. Phys."},{"key":"35_CR11","unstructured":"Padgett, J.F., Ansell, C.K.: Robust action and the rise of the medici, 1400-1434. Am. J. Soc. 98(6), 1259\u20131319 (1993). http:\/\/www.jstor.org\/stable\/2781822"},{"issue":"2","key":"35_CR12","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/TNSE.2015.2425961","volume":"2","author":"M Salehi","year":"2015","unstructured":"Salehi, M., Sharma, R., Marzolla, M., Magnani, M., Siyari, P., Montesi, D.: Spreading processes in multilayer networks. IEEE Trans. Netw. Sci. Eng. 2(2), 65\u201383 (2015). https:\/\/doi.org\/10.1109\/TNSE.2015.2425961","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"35_CR13","doi-asserted-by":"publisher","unstructured":"Shakarian, P., Bhatnagar, A., Aleali, A., Shaabani, E., Guo, R.: The independent cascade and linear threshold models. pp. 35\u201348. Springer International Publishing, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23105-1_4","DOI":"10.1007\/978-3-319-23105-1_4"},{"issue":"3","key":"35_CR14","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/69.846291","volume":"12","author":"MJ Zaki","year":"2000","unstructured":"Zaki, M.J.: Scalable algorithms for association mining. IEEE Trans. Knowl. Data Eng. 12(3), 372\u2013390 (2000). https:\/\/doi.org\/10.1109\/69.846291","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"35_CR15","doi-asserted-by":"publisher","unstructured":"Zhang, J.X., Chen, D.B., Dong, Q., Zhao, Z.D.: Identifying a set of influential spreaders in complex networks. Sci. Rep. 6, 27823 EP (2016). https:\/\/doi.org\/10.1038\/srep27823","DOI":"10.1038\/srep27823"},{"key":"35_CR16","doi-asserted-by":"publisher","unstructured":"Zhao, D., Li, L., Li, S., Huo, Y., Yang, Y.: Identifying influential spreaders in interconnected networks. Phys. Scr. 89(1), 015203 (2013). https:\/\/doi.org\/10.1088\/0031-8949\/89\/01\/015203","DOI":"10.1088\/0031-8949\/89\/01\/015203"}],"container-title":["Studies in Computational Intelligence","Complex Networks &amp; Their Applications VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72150-7_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T17:00:47Z","timestamp":1570381247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72150-7_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,27]]},"ISBN":["9783319721491","9783319721507"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72150-7_35","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2017,11,27]]}}}