{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T09:59:39Z","timestamp":1772618379249,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540855668","type":"print"},{"value":"9783540855675","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85567-5_9","type":"book-chapter","created":{"date-parts":[[2008,9,1]],"date-time":"2008-09-01T01:37:43Z","timestamp":1220233063000},"page":"67-75","source":"Crossref","is-referenced-by-count":249,"title":["Prediction of Information Diffusion Probabilities for Independent Cascade Model"],"prefix":"10.1007","author":[{"given":"Kazumi","family":"Saito","sequence":"first","affiliation":[]},{"given":"Ryohei","family":"Nakano","sequence":"additional","affiliation":[]},{"given":"Masahiro","family":"Kimura","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Adar, E., Adamic, L.: Tracking information epidemics in blogspace. In: Proc. of the 2005 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI 2005), pp. 207\u2013214 (2005)","DOI":"10.1109\/WI.2005.151"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R. Albert","year":"2000","unstructured":"Albert, R., Jeong, H., Barab\u00e1si, A.L.: Error and attack tolerance of complex networks. Nature\u00a0406, 378\u2013382 (2000)","journal-title":"Nature"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A.L. Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si, A.L., Albert, R.: Emergence of scaling in random networks. Science\u00a0286, 509\u2013512 (1999)","journal-title":"Science"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1126\/science.1095845","volume":"304","author":"J. Balthrop","year":"2004","unstructured":"Balthrop, J., Forrest, S., Newman, M.E.J., Williampson, M.W.: Technological networks and the spread of computer viruses. Science\u00a0304, 527\u2013529 (2004)","journal-title":"Science"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Broder, A., Kumar, R., Maghoul, F., Raghavan, P., Rajagopalan, S., Stata, R., Tomkins, A., Wiener, J.: Graph structure in the Web. In: Proc. of the 9th International World Wide Web Conference (WWW 2000), pp. 309\u2013320 (2000)","DOI":"10.1016\/S1389-1286(00)00083-9"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"5468","DOI":"10.1103\/PhysRevLett.85.5468","volume":"85","author":"D.S. Callaway","year":"2000","unstructured":"Callaway, D.S., Newman, M.E.J., Strogatz, S.H., Watts, D.J.: Network robustness and fragility: Percolation on random graphs. Physical Review Letters\u00a085, 5468\u20135471 (2000)","journal-title":"Physical Review Letters"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Domingos, P., Richardson, M.: Mining the network value of customers. In: Proc. of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-2001), pp. 57\u201366 (2001)","DOI":"10.1145\/502512.502525"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1023\/A:1011122126881","volume":"12","author":"J. Goldenberg","year":"2001","unstructured":"Goldenberg, J., Libai, B., Muller, E.: Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters\u00a012, 211\u2013223 (2001)","journal-title":"Marketing Letters"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Gruhl, D., Guha, R., Liben-Nowell, D., Tomkins, A.: Information diffusion through blogspace. In: Proc. of the 13th International World Wide Web Conference (WWW 2004), pp. 107\u2013117 (2004)","DOI":"10.1145\/988672.988739"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proc. of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-2003), pp. 137\u2013146 (2003)","DOI":"10.1145\/956750.956769"},{"key":"9_CR11","unstructured":"Kimura, M., Saito, K., Nakano, R.: Extracting influential nodes for information diffusion on a social network. In: Proc. of the 22nd AAAI Conference on Artificial Intelligence (AAAI-2007), pp. 1371\u20131376 (2007)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Adamic, L., Huberman, B.A.: The dynamics of viral marketing. In: Proc. of the 7th ACM Conference on Electronic Commerce (EC-2006), pp. 228\u2013237 (2006)","DOI":"10.1145\/1134707.1134732"},{"key":"9_CR13","unstructured":"McCallum, A., Corrada-Emmanuel, A., Wang, X.: Topic and role discovery in social networks. In: Proc. of the 19th International Joint Conference on Artificial Intelligence (IJCAI-2005), pp. 786\u2013791 (2005)"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"35101","DOI":"10.1103\/PhysRevE.66.035101","volume":"66","author":"M.E.J. Newman","year":"2002","unstructured":"Newman, M.E.J., Forrest, S., Balthrop, J.: Email networks and the spread of computer viruses. Physical Review E\u00a066, 035101 (2002)","journal-title":"Physical Review E"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S003614450342480","volume":"45","author":"M.E.J. Newman","year":"2003","unstructured":"Newman, M.E.J.: The structure and function of complex networks. SIAM Review\u00a045, 167\u2013256 (2003)","journal-title":"SIAM Review"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1038\/nature03607","volume":"435","author":"G. Palla","year":"2005","unstructured":"Palla, G., Der\u00e9nyi, I., Farkas, I., Vicsek, T.: Uncovering the overlapping community structure of complex networks in nature and society. Nature\u00a0435, 814\u2013818 (2005)","journal-title":"Nature"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Richardson, M., Domingos, P.: Mining knowledge-sharing sites for viral marketing. In: Proc. of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-2002), pp. 61\u201370 (2002)","DOI":"10.1145\/775047.775057"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1038\/35065725","volume":"410","author":"S.H. Strogatz","year":"2001","unstructured":"Strogatz, S.H.: Exploring complex networks. Nature\u00a0410, 268\u2013276 (2001)","journal-title":"Nature"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Song, X., Chi, Y., Hino, K., Tseng, B.L.: Information flow modeling based on diffusion rate for prediction and ranking. In: Proc. of the 16th International World Wide Web Conference (WWW-2007), pp. 191\u2013200 (2007)","DOI":"10.1145\/1242572.1242599"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Watts, D.J.: A simple model of global cascades on random networks. In: Proc. of the National Academy of Sciences of the United States of America, vol.\u00a099, pp. 5766\u20135771 (2002)","DOI":"10.1073\/pnas.082090499"}],"container-title":["Lecture Notes in Computer Science","Knowledge-Based Intelligent Information and Engineering Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85567-5_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:42:02Z","timestamp":1619523722000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85567-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540855668","9783540855675"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85567-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}