{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:57:59Z","timestamp":1768316279276,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T00:00:00Z","timestamp":1449792000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T00:00:00Z","timestamp":1449792000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1256087"],"award-info":[{"award-number":["CCF-1256087"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1319998"],"award-info":[{"award-number":["CCF-1319998"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["R21HG006913"],"award-info":[{"award-number":["R21HG006913"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["R01HG007104"],"award-info":[{"award-number":["R01HG007104"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s10115-015-0904-x","type":"journal-article","created":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T11:32:40Z","timestamp":1449833560000},"page":"403-427","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Diffusion archeology for diffusion progression history reconstruction"],"prefix":"10.1007","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9186-0270","authenticated-orcid":false,"given":"Emre","family":"Sefer","sequence":"first","affiliation":[]},{"given":"Carl","family":"Kingsford","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,11]]},"reference":[{"key":"904_CR1","doi-asserted-by":"crossref","DOI":"10.1002\/0471249688","volume-title":"Categorical data analysis, Wiley series in probability and statistics","author":"A Agresti","year":"2002","unstructured":"Agresti A (2002) Categorical data analysis, Wiley series in probability and statistics, 2nd edn. Wiley-Interscience, New Jersey","edition":"2"},{"issue":"6","key":"904_CR2","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1061\/(ASCE)0733-9496(2008)134:6(556)","volume":"134","author":"O Avi","year":"2008","unstructured":"Avi O et al (2008) The battle of water sensor networks (bwsn): a design challenge for engineers and algorithms. J Water Resour Plan Manag 134(6):556\u2013568","journal-title":"J Water Resour Plan Manag"},{"issue":"5439","key":"904_CR3","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A-L Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si A-L, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509\u2013512","journal-title":"Science"},{"key":"904_CR4","doi-asserted-by":"crossref","unstructured":"Blondel VD, Guillaume J-L, Lambiotte R, Lefebvre E (2008) Fast unfolding of communities in large networks. J Stat Mech: Theory Exp (10):P10008+","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"issue":"9","key":"904_CR5","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1109\/TPAMI.2004.60","volume":"26","author":"Y Boykov","year":"2004","unstructured":"Boykov Y, Kolmogorov V (2004) An experimental comparison of min-cut\/max- flow algorithms for energy minimization in vision. Pattern Anal Mach Intell IEEE Trans 26(9):1124\u20131137","journal-title":"Pattern Anal Mach Intell IEEE Trans"},{"key":"904_CR6","doi-asserted-by":"crossref","unstructured":"Buchbinder N, Feldman M, Naor JS, Schwartz R (2012) A tight linear time (1\/2)-approximation for unconstrained submodular maximization. In: 2012 IEEE 53rd annual symposium on foundations of computer science, IEEE, pp\u00a0649\u2013658","DOI":"10.1109\/FOCS.2012.73"},{"key":"904_CR7","unstructured":"Erdos P, Rnyi A (1960) On the evolution of random graphs. In: Publication of the Mathematical Institute of the Hungarian Academy of Sciences, pp\u00a017\u201361"},{"issue":"4","key":"904_CR8","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1145\/285055.285059","volume":"45","author":"U Feige","year":"1998","unstructured":"Feige U (1998) A threshold of ln n for approximating set cover. J ACM 45(4):634\u2013652","journal-title":"J ACM"},{"key":"904_CR9","doi-asserted-by":"crossref","unstructured":"Feige U, Goemans M (1995) Approximating the value of two power proof systems, with applications to max 2sat and max dicut. In: Theory of computing and systems, 1995. Proceedings of the third Israel symposium, pp\u00a0182\u2013189","DOI":"10.1109\/ISTCS.1995.377033"},{"key":"904_CR10","doi-asserted-by":"crossref","unstructured":"Feige U, Mirrokni VS, Vondrak J (2007) Maximizing non-monotone submodular functions. In: Proceedings of the 48th annual IEEE symposium on foundations of computer science. FOCS \u201907. IEEE Computer Society, Washington, DC, USA, pp 461\u2013471","DOI":"10.1109\/FOCS.2007.29"},{"key":"904_CR11","doi-asserted-by":"crossref","unstructured":"Gomez-Rodriguez M, Leskovec J, Sch\u00f6lkopf B (2013) Structure and dynamics of information pathways in online media. WSDM \u201913. ACM, New York, pp 23\u201332","DOI":"10.1145\/2433396.2433402"},{"key":"904_CR12","doi-asserted-by":"crossref","unstructured":"Gupta A, Roth A, Schoenebeck G, Talwar K (2010) Constrained non-monotone submodular maximization: offline and secretary algorithms. CoRR, abs\/1003.1517","DOI":"10.1007\/978-3-642-17572-5_20"},{"issue":"4","key":"904_CR13","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1137\/S0036144500371907","volume":"42","author":"HW Hethcote","year":"2000","unstructured":"Hethcote HW (2000) The mathematics of infectious diseases. SIAM Rev 42(4):599\u2013653","journal-title":"SIAM Rev"},{"key":"904_CR14","doi-asserted-by":"crossref","unstructured":"Hochbaum DS (2000) Instant recognition of polynomial time solvability, half integrality and 2-approximations. In: \u2018APPROX \u201900\u2019, Springer, Berlin, pp\u00a02\u201314","DOI":"10.1007\/3-540-44436-X_2"},{"issue":"7","key":"904_CR15","doi-asserted-by":"publisher","first-page":"e1003142","DOI":"10.1371\/journal.pcbi.1003142","volume":"9","author":"P Holme","year":"2013","unstructured":"Holme P (2013) Epidemiologically optimal static networks from temporal network data. PLoS Comput Biol 9(7):e1003142","journal-title":"PLoS Comput Biol"},{"key":"904_CR16","unstructured":"IBM ILOG CPLEX Optimizer ( 2010) \n                    http:\/\/www.ilog.com\/products\/cplex\/"},{"key":"904_CR17","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, pp 137\u2013146","DOI":"10.1145\/956750.956769"},{"key":"904_CR18","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/TPAMI.2004.1262177","volume":"26","author":"V Kolmogorov","year":"2004","unstructured":"Kolmogorov V, Zabih R (2004) What energy functions can be minimized via graph cuts. IEEE Trans Pattern Anal Mach Intell 26:65\u201381","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"904_CR19","volume-title":"Finding effectors in social networks, in \u2018KDD \u201910\u2019","author":"T Lappas","year":"2010","unstructured":"Lappas T, Terzi E, Gunopulos D, Mannila H (2010) Finding effectors in social networks, in \u2018KDD \u201910\u2019. ACM Press, New York"},{"key":"904_CR20","doi-asserted-by":"crossref","unstructured":"Lee J, Mirrokni VS, Nagarajan V, Sviridenko M (2009) Non-monotone submodular maximization under matroid and knapsack constraints. IN: Proceedings of the forty-first annual ACM symposium on theory of computing. ACM, New York, pp 323\u2013332","DOI":"10.1145\/1536414.1536459"},{"issue":"1","key":"904_CR21","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1232722.1232727","volume":"1","author":"J Leskovec","year":"2007","unstructured":"Leskovec J, Adamic LA, Huberman BA (2007) The dynamics of viral marketing. ACM Trans Web 1(1):5","journal-title":"ACM Trans Web"},{"key":"904_CR22","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1145\/1081870.1081893","volume-title":"KDD \u201905","author":"J Leskovec","year":"2005","unstructured":"Leskovec J, Kleinberg J, Faloutsos C (2005) Graphs over time: densification laws, shrinking diameters and possible explanations. KDD \u201905. ACM, New York, pp 177\u2013187"},{"key":"904_CR23","doi-asserted-by":"crossref","unstructured":"Prakash BA, Chakrabarti D, Faloutsos M, Valler N, Faloutsos C (2011) Threshold conditions for arbitrary cascade models on arbitrary networks. In: Proceedings of the 2011 IEEE 11th international conference on data mining. IEEE Computer Society, Washington, DC, pp 537\u2013546","DOI":"10.1109\/ICDM.2011.145"},{"key":"904_CR24","doi-asserted-by":"crossref","unstructured":"Prakash BA, Vreeken J, Faloutsos C (2012) Spotting culprits in epidemics: How many and which ones? In: \u2018ICDM\u2019, pp\u00a011\u201320","DOI":"10.1109\/ICDM.2012.136"},{"key":"904_CR25","doi-asserted-by":"crossref","unstructured":"Rossman L (1999) The epanet programmer\u2019s toolkit for analysis of water distribution systems. In: \u2018WRPMD\u201999\u2019, pp\u00a01\u201310","DOI":"10.1061\/40430(1999)39"},{"issue":"51","key":"904_CR26","doi-asserted-by":"publisher","first-page":"22020","DOI":"10.1073\/pnas.1009094108","volume":"107","author":"M Salath\u00e9","year":"2010","unstructured":"Salath\u00e9 M, Kazandjieva M, Lee JW, Levis P, Feldman MW, Jones JH (2010) A high-resolution human contact network for infectious disease transmission. Proc Natl Acad Sci USA 107(51):22020\u201322025","journal-title":"Proc Natl Acad Sci USA"},{"key":"904_CR27","volume-title":"Combinatorial optimization\u2014polyhedra and efficiency","author":"A Schrijver","year":"2003","unstructured":"Schrijver A (2003) Combinatorial optimization\u2014polyhedra and efficiency. Springer, Berlin"},{"key":"904_CR28","doi-asserted-by":"crossref","unstructured":"Sefer E, Kingsford C (2011) Metric labeling and semi-metric embedding for protein annotation prediction. In: Research in computational molecular biology. Springer, Berlin, pp\u00a0392\u2013407","DOI":"10.1007\/978-3-642-20036-6_37"},{"key":"904_CR29","doi-asserted-by":"crossref","unstructured":"Sefer E, Kingsford C (2014) Diffusion archaeology for diffusion progression history reconstruction. In: Data mining (ICDM), 2014 IEEE international conference on, pp\u00a0530\u2013539","DOI":"10.1109\/ICDM.2014.135"},{"key":"904_CR30","doi-asserted-by":"crossref","unstructured":"Sefer E, Kingsford C (2015) Convex risk minimization to infer networks from probabilistic diffusion data at multiple scales. In: Data engineering (ICDE), 2015 IEEE 31st international conference on, pp\u00a0663\u2013674","DOI":"10.1109\/ICDE.2015.7113323"},{"key":"904_CR31","unstructured":"Serazzi G, Zanero S (2003) Computer virus propagation models. In: In Tutorials of the 11th IEEE\/ACM international symposium on modeling, analysis and simulation of computer and telecommunications systems (MASCOTS03)\u2019, Springer, Berlin"},{"key":"904_CR32","unstructured":"Shah D, Zaman T (2011) Finding rumor sources on random graphs. \n                    arXiv:1110.6230"},{"key":"904_CR33","volume-title":"Integer and combinatorial optimization","author":"LA Wolsey","year":"1999","unstructured":"Wolsey LA, Nemhauser GL (1999) Integer and combinatorial optimization. Wiley-Interscience, New Jersey"},{"key":"904_CR34","doi-asserted-by":"crossref","unstructured":"Yang J, Leskovec J (2011) Patterns of temporal variation in online media. In: ACM international conference on web search and data minig (WSDM), pp\u00a0177\u2013186","DOI":"10.1145\/1935826.1935863"},{"issue":"7","key":"904_CR35","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1109\/LCOMM.2015.2437382","volume":"19","author":"Y-Q Zhang","year":"2015","unstructured":"Zhang Y-Q, Li X, Liang D, Cui J (2015) Characterizing bursts of aggregate pairs with individual poissonian activity and preferential mobility. Commun Lett IEEE 19(7):1225\u20131228","journal-title":"Commun Lett IEEE"},{"key":"904_CR36","unstructured":"Zhu K, Ying L (2015) Source localization in networks: trees and beyond. arXiv preprint \n                    arXiv:1510.01814"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-015-0904-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-015-0904-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-015-0904-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-015-0904-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T08:00:09Z","timestamp":1589443209000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-015-0904-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,11]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["904"],"URL":"https:\/\/doi.org\/10.1007\/s10115-015-0904-x","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,11]]},"assertion":[{"value":"16 May 2015","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2015","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2015","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2015","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}