{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:09:49Z","timestamp":1751688589505,"version":"3.41.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319914510"},{"type":"electronic","value":"9783319914527"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91452-7_23","type":"book-chapter","created":{"date-parts":[[2018,5,12]],"date-time":"2018-05-12T06:43:19Z","timestamp":1526107399000},"page":"342-351","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Exploiting Reshaping Subgraphs from Bilateral Propagation Graphs"],"prefix":"10.1007","author":[{"given":"Saeid","family":"Hosseini","sequence":"first","affiliation":[]},{"given":"Hongzhi","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Ngai-Man","family":"Cheung","sequence":"additional","affiliation":[]},{"given":"Kan Pak","family":"Leng","sequence":"additional","affiliation":[]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[]},{"given":"Xiaofang","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,13]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 57\u201366. ACM (2001)","DOI":"10.1145\/502512.502525"},{"issue":"6","key":"23_CR2","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter, M.: Threshold models of collective behavior. Am. J. Sociol. 83(6), 1420\u20131443 (1978)","journal-title":"Am. J. Sociol."},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146. ACM (2003)","DOI":"10.1145\/956750.956769"},{"issue":"5948","key":"23_CR4","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1126\/science.1175570","volume":"325","author":"J Medlock","year":"2009","unstructured":"Medlock, J., Galvani, A.P.: Optimizing influenza vaccine distribution. Science 325(5948), 1705\u20131708 (2009)","journal-title":"Science"},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1146\/annurev-publhealth-031816-044528","volume":"38","author":"TW Valente","year":"2017","unstructured":"Valente, T.W., Pitts, S.R.: An appraisal of social network theory and analysis as applied to public health: challenges and opportunities. Annu. Rev. Pub. Health 38, 103\u2013118 (2017)","journal-title":"Annu. Rev. Pub. Health"},{"issue":"23","key":"23_CR6","doi-asserted-by":"publisher","first-page":"10480","DOI":"10.1016\/j.apm.2016.07.019","volume":"40","author":"V Babishin","year":"2016","unstructured":"Babishin, V., Taghipour, S.: Optimal maintenance policy for multicomponent systems with periodic and opportunistic inspections and preventive replacements. Appl. Math. Model. 40(23), 10480\u201310505 (2016)","journal-title":"Appl. Math. Model."},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.energy.2017.07.104","volume":"138","author":"N Cauchi","year":"2017","unstructured":"Cauchi, N., Macek, K., Abate, A.: Model-based predictive maintenance in building automation systems with user discomfort. Energy 138, 306\u2013315 (2017)","journal-title":"Energy"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Hua, W., Wang, Z., Wang, H., Zheng, K., Zhou, X.: Short text understanding through lexical-semantic analysis. In: 2015 IEEE 31st International Conference on Data Engineering (ICDE), pp. 495\u2013506. IEEE (2015)","DOI":"10.1109\/ICDE.2015.7113309"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/978-3-319-05810-8_33","volume-title":"Database Systems for Advanced Applications","author":"S Hosseini","year":"2014","unstructured":"Hosseini, S., Unankard, S., Zhou, X., Sadiq, S.: Location oriented phrase detection in microblogs. In: Bhowmick, S.S., Dyreson, C.E., Jensen, C.S., Lee, M.L., Muliantara, A., Thalheim, B. (eds.) DASFAA 2014. LNCS, vol. 8421, pp. 495\u2013509. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05810-8_33"},{"key":"23_CR10","unstructured":"Peng, S., Wang, G., Zhou, Y., Wan, C., Wang, C., Yu, S.: An immunization framework for social networks through big data based influence modeling. IEEE Trans. Dependable Secure Comput (2017)"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Gomez Rodriguez, M., Leskovec, J., Krause, A.: Inferring networks of diffusion and influence. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1019\u20131028. ACM (2010)","DOI":"10.1145\/1835804.1835933"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Goyal, A., Bonchi, F., Lakshmanan, L.V.: Learning influence probabilities in social networks. In: Proceedings of the Third ACM International Conference on Web Search and Data Mining, pp. 241\u2013250. ACM (2010)","DOI":"10.1145\/1718487.1718518"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1007\/978-3-319-55753-3_31","volume-title":"Database Systems for Advanced Applications","author":"S Hosseini","year":"2017","unstructured":"Hosseini, S., Yin, H., Zhang, M., Zhou, X., Sadiq, S.: Jointly modeling heterogeneous temporal properties in location recommendation. In: Candan, S., Chen, L., Pedersen, T.B., Chang, L., Hua, W. (eds.) DASFAA 2017. LNCS, vol. 10177, pp. 490\u2013506. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-55753-3_31"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Mathioudakis, M., Bonchi, F., Castillo, C., Gionis, A., Ukkonen, A.: Sparsification of influence networks. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 529\u2013537. ACM (2011)","DOI":"10.1145\/2020408.2020492"},{"issue":"12","key":"23_CR15","doi-asserted-by":"publisher","first-page":"3339","DOI":"10.1109\/TKDE.2016.2605088","volume":"28","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Adiga, A., Saha, S., Vullikanti, A., Prakash, B.A.: Near-optimal algorithms for controlling propagation at group scale on networks. IEEE Trans. Knowl. Data Eng. 28(12), 3339\u20133352 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"23_CR16","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s10115-012-0520-y","volume":"33","author":"BA Prakash","year":"2012","unstructured":"Prakash, B.A., Chakrabarti, D., Valler, N.C., Faloutsos, M., Faloutsos, C.: Threshold conditions for arbitrary cascade models on arbitrary networks. Knowl. Inf. Syst. 33(3), 549\u2013575 (2012)","journal-title":"Knowl. Inf. Syst."},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Ghasemiesfeh, G., Ebrahimi, R., Gao, J.: Complex contagion and the weakness of long ties in social networks: revisited. In: Proceedings of the fourteenth ACM conference on Electronic Commerce, pp. 507\u2013524. ACM (2013)","DOI":"10.1145\/2492002.2482550"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Khalil, E.B., Dilkina, B., Song, L.: Scalable diffusion-aware optimization of network topology. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1226\u20131235. ACM (2014)","DOI":"10.1145\/2623330.2623704"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Prakash, B.A., Beutel, A., Rosenfeld, R., Faloutsos, C.: Winner takes all: competing viruses or ideas on fair-play networks. In: Proceedings of the 21st International Conference on World Wide Web, pp. 1037\u20131046. ACM (2012)","DOI":"10.1145\/2187836.2187975"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Ganesh, A., Massouli, L., Towsley, D.: The effect of network topology on the spread of epidemics. In: Proceedings of the IEEE INFOCOM 2005, 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 1455\u20131466. IEEE (2005)","DOI":"10.1109\/INFCOM.2005.1498374"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Prakash, B.A., Adamic, L., Iwashyna, T., Tong, H., Faloutsos, C.: Fractional immunization in networks. In: Proceedings of the 2013 SIAM International Conference on Data Mining, SIAM 2013, pp. 659\u2013667 (2013)","DOI":"10.1137\/1.9781611972832.73"},{"key":"23_CR22","unstructured":"Roth, D.Z., Henry, B.: Social distancing as a pandemic influenza prevention measure: evidence review. National Collaborating Centre for Infectious Diseases (2011)"},{"key":"23_CR23","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.3934\/mbe.2013.10.1615","volume":"10","author":"E Shim","year":"2013","unstructured":"Shim, E.: Optimal strategies of social distancing and vaccination against seasonal influenza. Math. Biosci. Eng. 10, 1615\u20131634 (2013)","journal-title":"Math. Biosci. Eng."},{"issue":"24","key":"23_CR24","doi-asserted-by":"publisher","first-page":"247901","DOI":"10.1103\/PhysRevLett.91.247901","volume":"91","author":"R Cohen","year":"2003","unstructured":"Cohen, R., Havlin, S., Ben-Avraham, D.: Efficient immunization strategies for computer networks and populations. Phys. Rev. Lett. 91(24), 247901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Saha, S., Adiga, A., Prakash, B.A., Vullikanti, A.K.S.: Approximation algorithms for reducing the spectral radius to control epidemic spread. In: Proceedings of the 2015 SIAM International Conference on Data Mining, SIAM 2015, pp. 568\u2013576 (2015)","DOI":"10.1137\/1.9781611974010.64"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Prakash, B.A.: Dava: distributing vaccines over networks under prior information. In: Proceedings of the 2014 SIAM International Conference on Data Mining, SIAM 2014, pp. 46\u201354 (2014)","DOI":"10.1137\/1.9781611973440.6"},{"key":"23_CR27","unstructured":"Aspnes, J., Chang, K., Yampolskiy, A.: Inoculation strategies for victims of viruses and the sum-of-squares partition problem. In: Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, pp. 43\u201352 (2005)"},{"issue":"1","key":"23_CR28","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1109\/TKDE.2015.2465378","volume":"28","author":"C Chen","year":"2016","unstructured":"Chen, C., Tong, H., Prakash, B.A., Tsourakakis, C.E., Eliassi-Rad, T., Faloutsos, C., Chau, D.H.: Node immunization on large graphs: theory and algorithms. IEEE Trans. Knowl. Data Eng. 28(1), 113\u2013126 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91452-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T13:18:43Z","timestamp":1751635123000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91452-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319914510","9783319914527"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91452-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"13 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ict.griffith.edu.au\/conferences\/dasfaa2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}