{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T21:34:31Z","timestamp":1725831271837},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662486528"},{"type":"electronic","value":"9783662486535"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-48653-5_20","type":"book-chapter","created":{"date-parts":[[2015,10,2]],"date-time":"2015-10-02T22:46:01Z","timestamp":1443825961000},"page":"292-308","source":"Crossref","is-referenced-by-count":0,"title":["Local Information in Influence Networks"],"prefix":"10.1007","author":[{"given":"Yuezhou","family":"Lv","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Moscibroda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,5]]},"reference":[{"issue":"1","key":"20_CR1","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/0954-349X(93)90006-6","volume":"4","author":"WB Arthur","year":"1993","unstructured":"Arthur, W.B., Lane, D.A.: Information contagion. Structural Change and Economic Dynamics 4(1), 81\u2013104 (1993)","journal-title":"Structural Change and Economic Dynamics"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1029\u20131038. ACM (2010)","DOI":"10.1145\/1835804.1835934"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-642-41527-2_30","volume-title":"Distributed Computing","author":"S Frischknecht","year":"2013","unstructured":"Frischknecht, S., Keller, B., Wattenhofer, R.: Convergence in (Social) influence networks. In: Afek, Y. (ed.) DISC 2013. LNCS, vol. 8205, pp. 433\u2013446. Springer, Heidelberg (2013)"},{"issue":"4","key":"20_CR4","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1038\/scientificamerican1070-120","volume":"223","author":"M Gardner","year":"1970","unstructured":"Gardner, M.: Mathematical games: The fantastic combinations of john conways new solitaire game life. Scientific American 223(4), 120\u2013123 (1970)","journal-title":"Scientific American"},{"issue":"2","key":"20_CR5","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/0012-365X(80)90121-1","volume":"30","author":"E Goles","year":"1980","unstructured":"Goles, E., Olivos, J.: Periodic behaviour of generalized threshold functions. Discrete Mathematics 30(2), 187\u2013189 (1980)","journal-title":"Discrete Mathematics"},{"issue":"3","key":"20_CR6","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/0165-4896(83)90023-9","volume":"4","author":"E Goles","year":"1983","unstructured":"Goles, E., Tchuente, M.: Iterative behaviour of generalized majority functions. Mathematical Social Sciences 4(3), 197\u2013204 (1983)","journal-title":"Mathematical Social Sciences"},{"issue":"6","key":"20_CR7","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter, M.: Threshold models of collective behavior. American Journal of Sociology 83(6), 1420 (1978)","journal-title":"American Journal of Sociology"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, \u00c9.: Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146. ACM (2003)","DOI":"10.1145\/956755.956769"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1007\/11523468_91","volume-title":"Automata, Languages and Programming","author":"D Kempe","year":"2005","unstructured":"Kempe, D., Kleinberg, J.M., Tardos, \u00c9.: Influential nodes in a diffusion model for social networks. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 1127\u20131138. Springer, Heidelberg (2005)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420\u2013429. ACM (2007)","DOI":"10.1145\/1281192.1281239"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Macy, M.W.: Chains of cooperation: Threshold effects in collective action. American Sociological Review, pp. 730\u2013747 (1991)","DOI":"10.2307\/2096252"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Macy, M.W., Willer, R.: From factors to actors: Computational sociology and agent-based modeling. Annual review of sociology, pp. 143\u2013166 (2002)","DOI":"10.1146\/annurev.soc.28.110601.141117"},{"issue":"1","key":"20_CR13","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1111\/1467-937X.00121","volume":"67","author":"S Morris","year":"2000","unstructured":"Morris, S.: Contagion. The Review of Economic Studies 67(1), 57\u201378 (2000)","journal-title":"The Review of Economic Studies"},{"issue":"2","key":"20_CR14","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/S0304-3975(01)00055-X","volume":"282","author":"D Peleg","year":"2002","unstructured":"Peleg, D.: Local majorities, coalitions and monopolies in graphs: a review. Theoretical Computer Science 282(2), 231\u2013257 (2002)","journal-title":"Theoretical Computer Science"},{"issue":"1","key":"20_CR15","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/BF02579347","volume":"3","author":"S Poljak","year":"1983","unstructured":"Poljak, S., Sra, M.: On periodical behaviour in societies with symmetric influences. Combinatorica 3(1), 119\u2013121 (1983)","journal-title":"Combinatorica"},{"key":"20_CR16","unstructured":"Rogers Everett, M.: Diffusion of innovations. New York (1995)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Schelling, T.C.: Hockey helmets, concealed weapons, and daylight saving: A study of binary choices with externalities. Journal of Conflict Resolution, 381\u2013428 (1973)","DOI":"10.1177\/002200277301700302"},{"key":"20_CR18","unstructured":"Schelling, T.C.: Micromotives and macrobehavior. WW Norton & Company (2006)"},{"issue":"2","key":"20_CR19","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/BF00240425","volume":"2","author":"TW Valente","year":"1996","unstructured":"Valente, T.W.: Network models of the diffusion of innovations. Computational & Mathematical Organization Theory 2(2), 163\u2013164 (1996)","journal-title":"Computational & Mathematical Organization Theory"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Wasserman, S.: Social network analysis: Methods and applications, vol. 8. Cambridge University Press (1994)","DOI":"10.1017\/CBO9780511815478"},{"issue":"8","key":"20_CR21","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1145\/1378704.1378726","volume":"51","author":"P Winkler","year":"2008","unstructured":"Winkler, P.: Puzzled delightful graph theory. Communications of the ACM 51(8), 104\u2013104 (2008)","journal-title":"Communications of the ACM"},{"key":"20_CR22","unstructured":"Young, H.P.: Individual strategy and social structure: An evolutionary theory of institutions. Princeton University Press (2001)"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-48653-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T03:32:36Z","timestamp":1559273556000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-48653-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662486528","9783662486535"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-48653-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}