{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T18:20:16Z","timestamp":1767982816538,"version":"3.49.0"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,7,7]],"date-time":"2012-07-07T00:00:00Z","timestamp":1341619200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,7,7]],"date-time":"2012-07-07T00:00:00Z","timestamp":1341619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1007\/s10115-012-0520-y","type":"journal-article","created":{"date-parts":[[2012,7,6]],"date-time":"2012-07-06T15:00:45Z","timestamp":1341586845000},"page":"549-575","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":97,"title":["Threshold conditions for arbitrary cascade models on arbitrary networks"],"prefix":"10.1007","volume":"33","author":[{"given":"B. Aditya","family":"Prakash","sequence":"first","affiliation":[]},{"given":"Deepayan","family":"Chakrabarti","sequence":"additional","affiliation":[]},{"given":"Nicholas C.","family":"Valler","sequence":"additional","affiliation":[]},{"given":"Michalis","family":"Faloutsos","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Faloutsos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,7]]},"reference":[{"issue":"6794","key":"520_CR1","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"407","author":"R Albert","year":"2000","unstructured":"Albert R, Jeong H, Barab\u00e1si AL (2000) Error and attack tolerance of complex networks. Nature 407(6794): 378\u2013482","journal-title":"Nature"},{"key":"520_CR2","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198545996.001.0001","volume-title":"Infectious diseases of humans","author":"RM Anderson","year":"1991","unstructured":"Anderson RM, May RM (1991) Infectious diseases of humans. Oxford University Press, Oxford"},{"key":"520_CR3","volume-title":"Dynamical processes on complex networks","author":"A Barrat","year":"2010","unstructured":"Barrat A, Barth\u00e9lemy M, Vespignani A (2010) Dynamical processes on complex networks. Cambridge University Press, Cambridge"},{"key":"520_CR4","doi-asserted-by":"crossref","unstructured":"Barrett CL, Bisset KR, Eubank SG, Feng X, Marathe MV (2008) Episimdemics: an efficient algorithm for simulating the spread of infectious disease over large realistic social networks. In: ACM\/IEEE conference on supercomputing","DOI":"10.1109\/SC.2008.5214892"},{"issue":"5","key":"520_CR5","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1287\/mnsc.15.5.215","volume":"15","author":"FM Bass","year":"1969","unstructured":"Bass FM (1969) A new product growth for model consumer durables. Manag Sci 15(5): 215\u2013227","journal-title":"Manag Sci"},{"issue":"5","key":"520_CR6","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1086\/261849","volume":"100","author":"S Bikhchandani","year":"1992","unstructured":"Bikhchandani S, Hirshleifer D, Welch I (1992) A theory of fads, fashion, custom, and cultural change in informational cascades. J Political Econ 100(5): 992\u20131026","journal-title":"J Political Econ"},{"issue":"7291","key":"520_CR7","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1038\/nature08932","volume":"464","author":"SV Buldyrev","year":"2010","unstructured":"Buldyrev SV, Parshani R, Paul G, Stanley HE, Havlin S (2010) Catastrophic cascade of failures in interdependent networks. Nature 464(7291): 1025\u20131028","journal-title":"Nature"},{"key":"520_CR8","doi-asserted-by":"crossref","unstructured":"Castellano C, Pastor-Satorras R (2010) Thresholds for epidemic spreading in networks. Phys Rev Lett 105","DOI":"10.1103\/PhysRevLett.105.218701"},{"key":"520_CR9","doi-asserted-by":"crossref","unstructured":"Chakrabarti D, Leskovec J, Faloutsos C, Madden S, Guestrin C, Faloutsos M (2007) Information survival threshold in sensor and P2P networks. In: IEEE INFOCOM","DOI":"10.1109\/INFCOM.2007.156"},{"key":"520_CR10","doi-asserted-by":"crossref","unstructured":"Chakrabarti D, Wang Y, Wang C, Leskovec J, Faloutsos C (2008) Epidemic thresholds in real networks. ACM TISSEC 10(4)","DOI":"10.1145\/1284680.1284681"},{"key":"520_CR11","unstructured":"Chen Q, Chang H, Govindan R, Jamin S, Shenker SJ, Willinger W (2002) The origin of power laws in internet topologies revisited. In: IEEE INFOCOMM. http:\/\/topology.eecs.umich.edu\/data.html"},{"key":"520_CR12","doi-asserted-by":"crossref","unstructured":"Chen W, Wang C, Wang Y (2010) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: KDD","DOI":"10.1145\/1835804.1835934"},{"key":"520_CR13","doi-asserted-by":"crossref","unstructured":"Chung F, Lu L, Vu V (2003) Eigenvalues of random power law graphs. Ann Comb 7(1)","DOI":"10.1007\/s000260300002"},{"issue":"24","key":"520_CR14","doi-asserted-by":"publisher","first-page":"247901","DOI":"10.1103\/PhysRevLett.91.247901","volume":"91","author":"R Cohen","year":"2003","unstructured":"Cohen R, Havlin S, ben Avraham D (2003) Efficient immunization strategies for computer networks and populations. Phys Rev Lett 91(24): 247901","journal-title":"Phys Rev Lett"},{"key":"520_CR15","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1016\/j.jtbi.2004.09.006","volume":"232","author":"PS Dodds","year":"2004","unstructured":"Dodds PS, Watts DJ (2004) A generalized model of social and biological contagion. J Theor Biol 232: 587\u2013604","journal-title":"J Theor Biol"},{"key":"520_CR16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511761942","volume-title":"Networks, crowds, and markets: reasoning about a highly connected world","author":"D Easley","year":"2010","unstructured":"Easley D, Kleinberg J (2010) Networks, crowds, and markets: reasoning about a highly connected world. Cambridge University Press, Cambridge"},{"issue":"6988","key":"520_CR17","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1038\/nature02541","volume":"429","author":"S Eubank","year":"2004","unstructured":"Eubank S, Guclu H, Anil Kumar VS, Marathe MV, Srinivasan A, Toroczkai Z, Wang N (2004) Modelling disease outbreaks in realistic urban social networks. Nature 429(6988): 180\u2013184","journal-title":"Nature"},{"key":"520_CR18","doi-asserted-by":"crossref","unstructured":"Faloutsos M, Faloutsos P, Faloutsos C (1999) On power-law relationships of the internet topology. In: SIGCOMM, pp 251\u2013262","DOI":"10.1145\/316194.316229"},{"key":"520_CR19","unstructured":"Ganesh A, Massouli\u00e9 L, Towsley D (2005) The effect of network topology on the spread of epidemics. In: INFOCOM"},{"issue":"12","key":"520_CR20","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1023\/A:1011122126881","volume":"3","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg J, Libai B, Muller E (2001) Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark Lett 3(12): 211\u2013223","journal-title":"Mark Lett"},{"key":"520_CR21","doi-asserted-by":"crossref","unstructured":"Gomez Rodriguez M, Leskovec J, Krause A (2010) Inferring networks of diffusion and influence. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, New York, NY, USA (KDD \u201910), pp 1019\u20131028","DOI":"10.1145\/1835804.1835933"},{"issue":"6","key":"520_CR22","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter M (1978) Threshold models of collective behavior. Am J Sociol 83(6): 1420\u20131443","journal-title":"Am J Sociol"},{"key":"520_CR23","doi-asserted-by":"crossref","unstructured":"Gruhl D, Guha R, Liben-Nowell D, Tomkins A (2004) Information diffusion through blogspace. In: WWW \u201904. http:\/\/www2004.org\/proceedings\/docs\/1p491.pdf","DOI":"10.1145\/988672.988739"},{"key":"520_CR24","unstructured":"Hayashi Y, Minoura M, Matsukubo J (2003) Recoverable prevalence in growing scale-free networks and the effective immunization. arXiv:cond-mat\/0305549 v2"},{"key":"520_CR25","doi-asserted-by":"crossref","unstructured":"Hethcote HW (2000) The mathematics of infectious diseases. SIAM Rev 42","DOI":"10.1137\/S0036144500371907"},{"key":"520_CR26","doi-asserted-by":"crossref","unstructured":"Hethcote HW, Yorke JA (1984) Gonorrhea transmission dynamics and control. Springer Lecture notes in biomathematics 46","DOI":"10.1007\/978-3-662-07544-9"},{"key":"520_CR27","volume-title":"Differential equations, dynamical systems and linear algebra","author":"MW Hirsch","year":"1974","unstructured":"Hirsch MW, Smale S (1974) Differential equations, dynamical systems and linear algebra. Academic Press, New York"},{"key":"520_CR28","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511840371","volume-title":"Topics in matrix analysis","author":"RA Horn","year":"1991","unstructured":"Horn RA, Johnson CR (1991) Topics in matrix analysis. Cambridge University Press, Cambridge"},{"key":"520_CR29","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network. In: KDD","DOI":"10.1145\/956750.956769"},{"key":"520_CR30","doi-asserted-by":"crossref","unstructured":"Kephart JO, White SR (1993) Measuring and modeling computer virus prevalence. In: IEEE computer society symposium on research in security and privacy","DOI":"10.1109\/RISP.1993.287647"},{"key":"520_CR31","doi-asserted-by":"crossref","unstructured":"Kleinberg J (2007) The wireless epidemic. Nature 449","DOI":"10.1038\/449287a"},{"key":"520_CR32","doi-asserted-by":"crossref","unstructured":"Kumar R, Novak J, Raghavan P, Tomkins A (2003) On the bursty evolution of blogspace. In: WWW","DOI":"10.1145\/775152.775233"},{"key":"520_CR33","doi-asserted-by":"crossref","unstructured":"Lad M, Zhao X, Zhang B, Massey D, Zhang L (2003) Analysis of BGP update surge during slammer worm attack. In: 5th International workshop on distributed computing (IWDC). http:\/\/citeseer.ist.psu.edu\/lad03analysis.html","DOI":"10.1007\/978-3-540-24604-6_7"},{"key":"520_CR34","doi-asserted-by":"crossref","unstructured":"Lappas T, Terzi E, Gunopoulos D Mannila H (2010) Finding effectors in social networks. In: SIGKDD","DOI":"10.1145\/1835804.1835937"},{"key":"520_CR35","doi-asserted-by":"crossref","unstructured":"Leskovec J, Adamic LA, Huberman BA (2006) The dynamics of viral marketing. In: EC. ACM Press, New York, NY, USA, pp 228\u2013237","DOI":"10.1145\/1134707.1134732"},{"key":"520_CR36","doi-asserted-by":"crossref","unstructured":"Leskovec J, Backstrom L, Kleinberg J (2009) Meme-tracking and the dynamics of the news cycle. In: ACM SIGKDD","DOI":"10.1145\/1557019.1557077"},{"key":"520_CR37","doi-asserted-by":"crossref","unstructured":"Maymounkov P, Mazi\u00e8res D (2002) Kademlia: a peer-to-peer information system based on the XOR metric. In: Revised papers from the first international workshop on peer-to-peer systems, Springer, London, UK (IPTPS \u201901), pp 53\u201365. http:\/\/dl.acm.org\/citation.cfm?id=646334.687801","DOI":"10.1007\/3-540-45748-8_5"},{"key":"520_CR38","doi-asserted-by":"crossref","unstructured":"McCuler CR (2000) The many proofs and applications of perron\u2019s theorem. SIAM Rev 42","DOI":"10.1137\/S0036144599359449"},{"key":"520_CR39","unstructured":"McKendrick AG (1926) Applications of mathematics to medical problems. In: Proceedings of Edin. Math. Society, vol 14, pp 98\u2013130"},{"key":"520_CR40","doi-asserted-by":"crossref","unstructured":"Milnes HW (Aug\u2013Sept 1963) Conditions that the zeros of a polynomial lie in the interval [\u22121, 1] when all zeros are real. Am Math Mon 70(7)","DOI":"10.2307\/2312261"},{"key":"520_CR41","unstructured":"NDSSL (2007) Synthetic data products for societal infrastructures and protopopulations: data set 2.0. NDSSL-TR-07-003. http:\/\/ndssl.vbi.vt.edu\/Publications\/ndssl-tr-07-003.pdf"},{"issue":"1","key":"520_CR42","doi-asserted-by":"publisher","first-page":"016128","DOI":"10.1103\/PhysRevE.66.016128","volume":"66","author":"MEJ Newman","year":"2002","unstructured":"Newman MEJ (2002) Spread of epidemic disease on networks. Phys Rev E 66(1): 016128. doi:10.1103\/PhysRevE.66.016128","journal-title":"Phys Rev E"},{"issue":"10","key":"520_CR43","doi-asserted-by":"publisher","first-page":"108701","DOI":"10.1103\/PhysRevLett.95.108701","volume":"95","author":"MEJ Newman","year":"2005","unstructured":"Newman MEJ (2005) Threshold effects for two pathogens spreading on a network. Phys Rev Lett 95(10): 108701","journal-title":"Phys Rev Lett"},{"key":"520_CR44","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1103\/PhysRevLett.86.14","volume":"86","author":"R Pastor-Santorras","year":"2001","unstructured":"Pastor-Santorras R, Vespignani A (2001) Epidemic spreading in scale-free networks. Phys Rev Lett 86: 14","journal-title":"Phys Rev Lett"},{"key":"520_CR45","doi-asserted-by":"crossref","unstructured":"Pathak N, Banerjee A, Srivastava J (2010) A generalized linear threshold model for multiple cascades. In: ICDM","DOI":"10.1109\/ICDM.2010.153"},{"key":"520_CR46","doi-asserted-by":"crossref","unstructured":"Prakash BA, Tong H, Valler N, Faloutsos M, Faloutsos C (2010) Virus propagation on time-varying networks: theory and immunization algorithms. In: ECML-PKDD","DOI":"10.1007\/978-3-642-15939-8_7"},{"key":"520_CR47","doi-asserted-by":"crossref","unstructured":"Prakash BA, Beutel A, Rosenfeld R, Faloutsos C (2012) Winner takes all: competiting viruses or ideas on fair-play networks. In: WWW","DOI":"10.1145\/2187836.2187975"},{"key":"520_CR48","doi-asserted-by":"crossref","unstructured":"Richardson M, Domingos P (2002) Mining knowledge-sharing sites for viral marketing. In: SIGKDD","DOI":"10.1145\/775047.775057"},{"key":"520_CR49","unstructured":"Rogers EM (2003) Diffusion of innovations, 5th ed. Free Press. http:\/\/www.amazon.ca\/exec\/obidos\/redirect?tag=citeulike09-20&path=ASIN\/0743222091"},{"issue":"3","key":"520_CR50","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1007\/s10115-011-0396-2","volume":"30","author":"K Saito","year":"2012","unstructured":"Saito K, Kimura M, Ohara K, Motoda H (2012) Efficient discovery of influential nodes for sis models in social networks. Knowl Inf Syst (KAIS) 30(3): 613\u2013635","journal-title":"Knowl Inf Syst (KAIS)"},{"key":"520_CR51","doi-asserted-by":"crossref","unstructured":"Vojnovic M, Gupta V, Karagiannis T, Gkantsidis C (2008) Sampling strategies for epidemic-style information dissemination. In: IEEE INFOCOM","DOI":"10.1109\/INFOCOM.2008.229"},{"key":"520_CR52","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts DJ, Strogatz SH (1998) Collective dynamics of \u2018small-world\u2019 networks. Nature 393: 440\u2013442","journal-title":"Nature"},{"key":"520_CR53","unstructured":"Website (November 15, 2011) Mainline bittorrent website. http:\/\/www.bittorrent.com\/"},{"key":"520_CR54","doi-asserted-by":"publisher","unstructured":"Zhao J, Wu J, Feng X, Xiong H, Xu K (2011) Information propagation in online social networks: a tie-strength perspective. Knowl Inf Syst 1\u201320. doi:10.1007\/s10115-011-0445-x","DOI":"10.1007\/s10115-011-0445-x"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-012-0520-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-012-0520-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-012-0520-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-012-0520-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T14:03:08Z","timestamp":1714140188000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-012-0520-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,7]]},"references-count":54,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["520"],"URL":"https:\/\/doi.org\/10.1007\/s10115-012-0520-y","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,7]]},"assertion":[{"value":"29 February 2012","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2012","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2012","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2012","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}