{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:34:45Z","timestamp":1766158485151,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811534249"},{"type":"electronic","value":"9789811534256"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-3425-6_7","type":"book-chapter","created":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T19:02:58Z","timestamp":1585767778000},"page":"77-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Evolutionary Optimization of Three-Degree Influence Spread in Social Networks Based on Discrete Bacterial Foraging Optimization Algorithm"],"prefix":"10.1007","author":[{"given":"Tian","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Lianbo","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Mingli","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,2]]},"reference":[{"key":"7_CR1","volume-title":"The World\u2019s Best Known Marketing Secret: Building Your Business With Word-of-Mouth Marketing","author":"IR Misner","year":"1994","unstructured":"Misner, I.R., Devine, V.: The World\u2019s Best Known Marketing Secret: Building Your Business With Word-of-Mouth Marketing. Bard Press, Austin (1994)"},{"unstructured":"Nail, J.: The consumer advertising backlash. Forrester Research and intelliseek Market Research Report (2004)","key":"7_CR2"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1016\/j.ins.2016.07.012","volume":"367","author":"M Gong","year":"2016","unstructured":"Gong, M., Yan, J., Shen, B.: Influence maximization in social networks based on discrete particle swarm optimization. Inf. Sci. 367, 600\u2013614 (2016). \nhttps:\/\/doi.org\/10.1016\/j.ins.2016.07.012","journal-title":"Inf. Sci."},{"doi-asserted-by":"publisher","unstructured":"Kempe, D., Kleinberg, J.: Maximizing the spread of influence through a social network. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137\u2013146. ACM (2003). \nhttps:\/\/doi.org\/10.1145\/956750.956769","key":"7_CR4","DOI":"10.1145\/956750.956769"},{"doi-asserted-by":"crossref","unstructured":"Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 57\u201366. ACM (2001)","key":"7_CR5","DOI":"10.1145\/502512.502525"},{"doi-asserted-by":"publisher","unstructured":"Leskovec, J., Krause, A., Guestrin, C.: Cost-effective outbreak detection in networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420\u2013429. ACM (2007). \nhttps:\/\/doi.org\/10.1145\/1281192.1281239","key":"7_CR6","DOI":"10.1145\/1281192.1281239"},{"doi-asserted-by":"publisher","unstructured":"Goyal, A., Lu, W., Lakshmanan, L.: CELF++: optimizing the greedy algorithm for influence maximization in social networks. In: International Conference Companion on World Wide Web, pp. 47\u201348. ACM (2011). \nhttps:\/\/doi.org\/10.1145\/1963192.1963217","key":"7_CR7","DOI":"10.1145\/1963192.1963217"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S Brin","year":"1998","unstructured":"Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. Comput. Netw. ISDN Syst. 30, 107\u2013117 (1998)","journal-title":"Comput. Netw. ISDN Syst."},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.knosys.2017.07.024","volume":"133","author":"L Ma","year":"2017","unstructured":"Ma, L., et al.: Cooperative two-engine multi-objective bee foraging algorithm with reinforcement learning. Knowl.-Based Syst. 133, 278\u2013293 (2017). \nhttps:\/\/doi.org\/10.1016\/j.knosys.2017.07.024","journal-title":"Knowl.-Based Syst."},{"issue":"3","key":"7_CR10","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MCS.2002.1004010","volume":"22","author":"KM Passino","year":"2002","unstructured":"Passino, K.M.: Biomimicry of bacterial foraging for distributed optimization and control. IEEE Control Syst. Mag. 22(3), 52\u201367 (2002)","journal-title":"IEEE Control Syst. Mag."},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.ins.2019.01.030","volume":"509","author":"L Ma","year":"2019","unstructured":"Ma, L., Wang, R., Chen, M., Wang, X., Cheng, S., Shi, Y.: A novel many-objective evolutionary algorithm based on transfer learning with kriging model. Inf. Sci. 509, 437\u2013456 (2019). \nhttps:\/\/doi.org\/10.1016\/j.ins.2019.01.030","journal-title":"Inf. Sci."},{"doi-asserted-by":"publisher","unstructured":"Marinakis, Y., Marinaki, M., Matsatsinis, N.: A hybrid discrete Artificial Bee Colony - GRASP algorithm for clustering. In: International Conference on Computers & Industrial Engineering, pp. 548\u2013553. IEEE (2009). \nhttps:\/\/doi.org\/10.1109\/ICCIE.2009.5223810","key":"7_CR12","DOI":"10.1109\/ICCIE.2009.5223810"},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.asoc.2015.08.014","volume":"37","author":"L Ma","year":"2015","unstructured":"Ma, L., Zhu, Y., Liu, Y., Tian, L.: A novel bionic algorithm inspired by plant root foraging behaviors. Appl. Soft Comput. 37, 95\u2013133 (2015). \nhttps:\/\/doi.org\/10.1016\/j.asoc.2015.08.014","journal-title":"Appl. Soft Comput."},{"issue":"5","key":"7_CR14","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1109\/TSMC.2017.2723483","volume":"49","author":"L Ma","year":"2019","unstructured":"Ma, L., Wang, X., Huang, M., Lin, Z., Tian, L., Chen, H.: Two-level master-slave RFID networks planning via hybrid multi-objective Artificial Bee Colony optimizer. IEEE Trans. Syst. Man Cybern. Syst. 49(5), 861\u2013880 (2019). \nhttps:\/\/doi.org\/10.1109\/TSMC.2017.2723483","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.jnca.2014.02.012","volume":"42","author":"L Ma","year":"2014","unstructured":"Ma, L., Hu, K., Zhu, Y., Chen, H.: Cooperative Artificial Bee Colony algorithm for multi-objective RFID network planning. J. Netw. Comput. Appl. 42, 143\u2013162 (2014). \nhttps:\/\/doi.org\/10.1016\/j.jnca.2014.02.012","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"7_CR16","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1007\/s00500-016-2068-3","volume":"21","author":"Y Qin","year":"2016","unstructured":"Qin, Y., Ma, J., Gao, S.: Efficient influence maximization under TSCM: a suitable diffusion model in online social networks. Soft. Comput. 21(4), 827\u2013838 (2016). \nhttps:\/\/doi.org\/10.1007\/s00500-016-2068-3","journal-title":"Soft. Comput."},{"doi-asserted-by":"publisher","unstructured":"Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 199\u2013208. DBLP, Paris (2009). \nhttps:\/\/doi.org\/10.1145\/1557019.1557047","key":"7_CR17","DOI":"10.1145\/1557019.1557047"},{"issue":"4","key":"7_CR18","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/S0169-5347(01)02115-2","volume":"16","author":"BJ Crespi","year":"2001","unstructured":"Crespi, B.J.: The evolution of social behavior in microorganisms. Trends Ecol. Evol. 16(4), 178\u2013183 (2001)","journal-title":"Trends Ecol. Evol."}],"container-title":["Communications in Computer and Information Science","Bio-inspired Computing: Theories and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-3425-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T01:30:33Z","timestamp":1585791033000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-3425-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811534249","9789811534256"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-3425-6_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"2 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BIC-TA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Bio-Inspired Computing: Theories and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhengzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bicta2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.bicta.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"197","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"121","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}