{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:59:07Z","timestamp":1760709547016,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319775371"},{"type":"electronic","value":"9783319775388"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-77538-8_9","type":"book-chapter","created":{"date-parts":[[2018,3,7]],"date-time":"2018-03-07T11:33:17Z","timestamp":1520422397000},"page":"117-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Improving Multi-objective Evolutionary Influence Maximization in Social Networks"],"prefix":"10.1007","author":[{"given":"Doina","family":"Bucur","sequence":"first","affiliation":[]},{"given":"Giovanni","family":"Iacca","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Marcelli","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Squillero","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5895-4809","authenticated-orcid":false,"given":"Alberto","family":"Tonda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,8]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781316212783","volume-title":"Hacking the Electorate: How Campaigns Perceive Voters","author":"ED Hersh","year":"2015","unstructured":"Hersh, E.D.: Hacking the Electorate: How Campaigns Perceive Voters. Cambridge University Press, Cambridge (2015)"},{"key":"9_CR2","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780199350247.001.0001","volume-title":"Prototype Politics: Technology-intensive Campaigning and the Data of Democracy","author":"D Kreiss","year":"2016","unstructured":"Kreiss, D.: Prototype Politics: Technology-intensive Campaigning and the Data of Democracy. Oxford University Press, Oxford (2016)"},{"key":"9_CR3","unstructured":"Grassegger, H., Krogerus, M.: The data that turned the world upside down. Luettu 28 (2017). Luettavissa: http:\/\/motherboard.vice.com\/read\/big-data-cambridge-analytica-brexit-trump"},{"issue":"4","key":"9_CR4","doi-asserted-by":"crossref","first-page":"105","DOI":"10.4086\/toc.2015.v011a004","volume":"11","author":"D Kempe","year":"2015","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. Theory Comput. 11(4), 105\u2013147 (2015)","journal-title":"Theory Comput."},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-39718-2_23","volume-title":"The Semantic Web - ISWC 2003","author":"M Richardson","year":"2003","unstructured":"Richardson, M., Agrawal, R., Domingos, P.: Trust management for the semantic web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 351\u2013368. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39718-2_23"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/978-3-319-31204-0_25","volume-title":"Applications of Evolutionary Computation","author":"D Bucur","year":"2016","unstructured":"Bucur, D., Iacca, G.: Influence maximization in social networks with genetic algorithms. In: Squillero, G., Burelli, P. (eds.) EvoApplications 2016. LNCS, vol. 9597, pp. 379\u2013392. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31204-0_25"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-319-55849-3_15","volume-title":"Applications of Evolutionary Computation","author":"D Bucur","year":"2017","unstructured":"Bucur, D., Iacca, G., Marcelli, A., Squillero, G., Tonda, A.: Multi-objective evolutionary algorithms for influence maximization in social networks. In: Squillero, G., Sim, K. (eds.) EvoApplications 2017. LNCS, vol. 10199, pp. 221\u2013233. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-55849-3_15"},{"issue":"3","key":"9_CR8","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1023\/A:1011122126881","volume":"12","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg, J., Libai, B., Muller, E.: Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark. Lett. 12(3), 211\u2013223 (2001)","journal-title":"Mark. Lett."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2009, pp. 199\u2013208. ACM, New York (2009)","DOI":"10.1145\/1557019.1557047"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, X., Zhao, C., Yi, D.: Maximizing the spread of influence via generalized degree discount. In: PloS one (2016)","DOI":"10.1371\/journal.pone.0164393"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 420\u2013429, August 2007","DOI":"10.1145\/1281192.1281239"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Song, G., Cong, G., Wang, Y., Si, W., Xie, K.: Simulated annealing based influence maximization in social networks. In: Burgard, W., Roth, D. (eds.) AAAI. AAAI Press (2011)","DOI":"10.1609\/aaai.v25i1.7838"},{"key":"9_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-36797-2","volume-title":"Evolutionary Algorithms for Solving Multi-objective Problems","author":"CAC Coello","year":"2002","unstructured":"Coello, C.A.C., Van Veldhuizen, D.A., Lamont, G.B.: Evolutionary Algorithms for Solving Multi-objective Problems, vol. 242. Springer, New York (2002). https:\/\/doi.org\/10.1007\/978-0-387-36797-2"},{"issue":"3","key":"9_CR14","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s10710-005-2985-x","volume":"6","author":"G Squillero","year":"2005","unstructured":"Squillero, G.: MicroGP - an evolutionary assembly program generator. Genet. Program. Evolvable Mach. 6(3), 247\u2013263 (2005)","journal-title":"Genet. Program. Evolvable Mach."},{"issue":"2","key":"9_CR15","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182\u2013197 (2002)","journal-title":"IEEE Trans. Evol. Comput."}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-77538-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T13:16:30Z","timestamp":1693574190000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-77538-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319775371","9783319775388"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-77538-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}