{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:03:44Z","timestamp":1725516224804},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334856"},{"type":"electronic","value":"9783642334863"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33486-3_33","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T16:39:17Z","timestamp":1347295157000},"page":"515-530","source":"Crossref","is-referenced-by-count":15,"title":["Influence Spread in Large-Scale Social Networks \u2013 A Belief Propagation Approach"],"prefix":"10.1007","author":[{"given":"Huy","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Rong","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Dignan, L.: HP\u2019s touchpad fire sale: The fallout (2011), http:\/\/www.zdnet.com\/blog\/btl\/hps-touchpad-fire-sale-the-fallout\/55594","key":"33_CR1"},{"key":"33_CR2","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/502512.502525","volume-title":"Procs. of KDD 2001","author":"P. Domingos","year":"2001","unstructured":"Domingos, P., Richardson, M.: Mining the network value of customers. In: Procs. of KDD 2001, pp. 57\u201366. ACM, New York (2001)"},{"key":"33_CR3","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/775047.775057","volume-title":"Proceedings of KDD 2002","author":"M. Richardson","year":"2002","unstructured":"Richardson, M., Domingos, P.: Mining knowledge-sharing sites for viral marketing. In: Proceedings of KDD 2002, pp. 61\u201370. ACM, New York (2002)"},{"key":"33_CR4","first-page":"137","volume-title":"Proceedings of the 9th ACM SIGKDD, KDD 2003","author":"D. Kempe","year":"2003","unstructured":"Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of the 9th ACM SIGKDD, KDD 2003, pp. 137\u2013146. ACM, New York (2003)"},{"key":"33_CR5","first-page":"420","volume-title":"Proceedings of the 13th ACM SIGKDD, KDD 2007","author":"J. Leskovec","year":"2007","unstructured":"Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD, KDD 2007, pp. 420\u2013429. ACM, New York (2007)"},{"key":"33_CR6","first-page":"47","volume-title":"Proc. of WWW 2011","author":"A. Goyal","year":"2011","unstructured":"Goyal, A., Lu, W., Lakshmanan, L.V.: Celf++: optimizing the greedy algorithm for influence maximization in social networks. In: Proc. of WWW 2011, pp. 47\u201348. ACM, New York (2011)"},{"key":"33_CR7","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1145\/1557019.1557047","volume-title":"Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2009","author":"W. Chen","year":"2009","unstructured":"Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2009, pp. 199\u2013208. ACM, New York (2009)"},{"key":"33_CR8","first-page":"1029","volume-title":"Proceedings of KDD 2010","author":"W. Chen","year":"2010","unstructured":"Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of KDD 2010, pp. 1029\u20131038. ACM, New York (2010)"},{"key":"33_CR9","first-page":"88","volume-title":"Proceedings of ICDM 2010","author":"W. Chen","year":"2010","unstructured":"Chen, W., Yuan, Y., Zhang, L.: Scalable influence maximization in social networks under the linear threshold model. In: Proceedings of ICDM 2010, pp. 88\u201397. IEEE Computer Society, Washington, DC (2010)"},{"key":"33_CR10","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.ipl.2010.11.015","volume":"111","author":"E. Even-Dar","year":"2011","unstructured":"Even-Dar, E., Shapira, A.: A note on maximizing the spread of influence in social networks. Inf. Process. Lett. 111, 184\u2013187 (2011)","journal-title":"Inf. Process. Lett."},{"unstructured":"Sylvester, J.: Maximizing diffusion on dynamic social networks. Science (2009)","key":"33_CR11"},{"doi-asserted-by":"crossref","unstructured":"Chen, W., Collins, A., Cummings, R., Ke, T., Liu, Z., Rincon, D., Sun, X., Wang, Y., Wei, W., Yuan, Y.: Influence maximization in social networks when negative opinions emerge and propagate. In: SDM, pp. 379\u2013390. SIAM\/Omnipress (2011)","key":"33_CR12","DOI":"10.1137\/1.9781611972818.33"},{"unstructured":"Yedidia, J.S., Freeman, W.T., Weiss, Y.: Understanding belief propagation and its generalizations, San Francisco, CA, USA, pp. 239\u2013269 (2003)","key":"33_CR13"},{"unstructured":"Pearl, J.: Reverend Bayes on inference engines: A distributed hierarchical approach. In: Proceedings of the AAAI 1982, Pittsburgh, PA, pp. 133\u2013136 (1982)","key":"33_CR14"},{"doi-asserted-by":"crossref","unstructured":"Lauritzen, S.L., Spiegelhalter, D.J.: Local Computations with Probabilities on Graphical Structures and Their Application to Expert Systems. Journal of the Royal Statistical Society. Series B (Methodological)\u00a050(2) (1988)","key":"33_CR15","DOI":"10.1111\/j.2517-6161.1988.tb01721.x"},{"unstructured":"Murphy, K.P., Weiss, Y., Jordan, M.I.: Loopy Belief Propagation for Approximate Inference: An Empirical Study. In: Procs. of Uncertainty in AI, pp. 467\u2013475 (1999)","key":"33_CR16"},{"doi-asserted-by":"crossref","unstructured":"Frey, B.J., Koetter, R., Petrovic, N.: Very loopy belief propagation for unwrapping phase images, vol.\u00a014, pp. 737\u2013743. MIT Press (2001)","key":"33_CR17","DOI":"10.7551\/mitpress\/1120.003.0099"},{"issue":"2","key":"33_CR18","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/49.661103","volume":"16","author":"R. McEliece","year":"1998","unstructured":"McEliece, R., MacKay, D., Cheng, J.F.: Turbo decoding as an instance of pearl\u2019s ldquo;belief propagation rdquo; algorithm. IEEE Journal on Selected Areas in Communications\u00a016(2), 140\u2013152 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"33_CR19","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/11871637_27","volume-title":"Knowledge Discovery in Databases: PKDD 2006","author":"M. Kimura","year":"2006","unstructured":"Kimura, M., Saito, K.: Tractable Models for Information Diffusion in Social Networks. In: F\u00fcrnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. LNCS (LNAI), vol.\u00a04213, pp. 259\u2013271. Springer, Heidelberg (2006)"},{"key":"33_CR20","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S. Brin","year":"1998","unstructured":"Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. Comput. Netw. ISDN Syst.\u00a030, 107\u2013117 (1998)","journal-title":"Comput. Netw. ISDN Syst."},{"issue":"3","key":"33_CR21","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"L. Freeman","year":"1979","unstructured":"Freeman, L.: Centrality in social networks conceptual clarification. Social Networks\u00a01(3), 215\u2013239 (1979)","journal-title":"Social Networks"},{"key":"33_CR22","first-page":"2169","volume":"11","author":"J.M. Mooij","year":"2010","unstructured":"Mooij, J.M.: libDAI: A free and open source C++ library for discrete approximate inference in graphical models. Journal of Machine Learning Research\u00a011, 2169\u20132173 (2010)","journal-title":"Journal of Machine Learning Research"},{"unstructured":"Boost.org: Boost c++ libraries, http:\/\/www.boost.org\/","key":"33_CR23"},{"unstructured":"Leskovec, J.: Stanford large network dataset collection, http:\/\/snap.stanford.edu\/data\/","key":"33_CR24"},{"unstructured":"Wiki, I.: Social network generation, http:\/\/www.infovis-wiki.net\/index.php\/Social_Network_Generation","key":"33_CR25"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33486-3_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T02:48:44Z","timestamp":1714358924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33486-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334856","9783642334863"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33486-3_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}