{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:28:24Z","timestamp":1762867704057,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,1,30]],"date-time":"2019-01-30T00:00:00Z","timestamp":1548806400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,30]],"date-time":"2019-01-30T00:00:00Z","timestamp":1548806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1353346"],"award-info":[{"award-number":["IIS-1353346"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000103","name":"National Endowment for the Humanities","doi-asserted-by":"publisher","award":["HG-229283-1"],"award-info":[{"award-number":["HG-229283-1"]}],"id":[{"id":"10.13039\/100000103","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006228","name":"Oak Ridge National Laboratory","doi-asserted-by":"publisher","award":["Order 4000143330"],"award-info":[{"award-number":["Order 4000143330"]}],"id":[{"id":"10.13039\/100006228","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Maryland Procurement Office","award":["H98230-14-C-0127"],"award-info":[{"award-number":["H98230-14-C-0127"]}]},{"DOI":"10.13039\/100000774","name":"Defense Threat Reduction Agency","doi-asserted-by":"publisher","award":["CNIMS Contract HDTRA1- 11-D-0016-0010"],"award-info":[{"award-number":["CNIMS Contract HDTRA1- 11-D-0016-0010"]}],"id":[{"id":"10.13039\/100000774","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1633028","DIBBS Grant ACI-1443054"],"award-info":[{"award-number":["IIS-1633028","DIBBS Grant ACI-1443054"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["EAGER SSDIM-1745207","IIS-1750407"],"award-info":[{"award-number":["EAGER SSDIM-1745207","IIS-1750407"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s10115-018-01326-x","type":"journal-article","created":{"date-parts":[[2019,1,31]],"date-time":"2019-01-31T05:05:21Z","timestamp":1548911121000},"page":"1667-1693","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Data-driven efficient network and surveillance-based immunization"],"prefix":"10.1007","volume":"61","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4203-9144","authenticated-orcid":false,"given":"Yao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Arvind","family":"Ramanathan","sequence":"additional","affiliation":[]},{"given":"Anil","family":"Vullikanti","sequence":"additional","affiliation":[]},{"given":"Laura","family":"Pullum","sequence":"additional","affiliation":[]},{"given":"B. Aditya","family":"Prakash","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,30]]},"reference":[{"key":"1326_CR1","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1126\/science.1175570","volume":"325","author":"J Medlock","year":"2009","unstructured":"Medlock J, Galvani AP (2009) Optimizing influenza vaccine distribution. Science 325:1705\u20131708","journal-title":"Science"},{"issue":"12","key":"1326_CR2","doi-asserted-by":"publisher","first-page":"4639","DOI":"10.1073\/pnas.0706849105","volume":"105","author":"M. E. Halloran","year":"2008","unstructured":"Halloran ME, Ferguson NM, Eubank S, Longini IM, Cummings DAT, Lewis B, Xu S, Fraser C, Vullikanti A, Germann TC, Wagener D, Beckman R, Kadau K, Barrett C, Macken CA, Burke DS, Cooley P (2008) Modeling targeted layered containment of an influenza pandemic in the United States. In: Proceedings of the National Academy of Sciences (PNAS), March 10 2008, pp 4639\u20134644","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"1326_CR3","doi-asserted-by":"crossref","unstructured":"Tong H, Prakash BA, Tsourakakis CE, Eliassi-Rad T, Faloutsos C, Chau DH (2010) On the vulnerability of large graphs. In: ICDM","DOI":"10.1109\/ICDM.2010.54"},{"key":"1326_CR4","doi-asserted-by":"crossref","unstructured":"Zhang Y, Adiga A, Vullikanti A, Prakash BA (2015) Controlling propagation at group scale on networks. In: 2015 IEEE international conference on data mining (ICDM). IEEE, pp 619\u2013628","DOI":"10.1109\/ICDM.2015.59"},{"key":"1326_CR5","doi-asserted-by":"crossref","unstructured":"Zhang Y, Prakash BA (2014) Dava: distributing vaccines over networks under prior information. In: Proceedings of the SIAM data mining conference, ser. SDM\u201914","DOI":"10.1137\/1.9781611973440.6"},{"key":"1326_CR6","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.epidem.2014.07.003","volume":"10","author":"L Pellis","year":"2015","unstructured":"Pellis L, Ball F, Bansal S, Eames K, House T, Isham V, Trapman P (2015) Eight challenges for network epidemic models. Epidemics 10:58\u201362","journal-title":"Epidemics"},{"issue":"17","key":"1326_CR7","doi-asserted-by":"publisher","first-page":"S4","DOI":"10.1186\/1471-2105-16-S17-S4","volume":"16","author":"A Ramanathan","year":"2015","unstructured":"Ramanathan A, Pullum LL, Hobson TC, Steed CA, Quinn SP, Chennubhotla CS, Valkova S (2015) Orbit: Oak Ridge biosurveillance toolkit for public health dynamics. BMC Bioinform 16(17):S4","journal-title":"BMC Bioinform"},{"issue":"4","key":"1326_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0153769","volume":"11","author":"O Ozmen","year":"2016","unstructured":"Ozmen O, Pullum LL, Ramanathan A, Nutaro JJ (2016) Augmenting epidemiological models with point-of-care diagnostics data. PLoS ONE 11(4):1\u201313 04","journal-title":"PLoS ONE"},{"key":"1326_CR9","doi-asserted-by":"crossref","unstructured":"Barrett CL, Beckman RJ, Khan M, Anil Kumar VS, Marathe MV, Stretz PE, Dutta T, Lewis B (2009) Generation and analysis of large synthetic social contact networks. In: Winter simulation conference, pp 1003\u20131014","DOI":"10.1109\/WSC.2009.5429425"},{"issue":"6988","key":"1326_CR10","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1038\/nature02541","volume":"429","author":"S Eubank","year":"2004","unstructured":"Eubank S, Guclu H, Anil Kumar VS, Marathe MV, Srinivasan A, Toroczkai Z, Wang N (2004) Modelling disease outbreaks in realistic urban social networks. Nature 429(6988):180\u2013184","journal-title":"Nature"},{"key":"1326_CR11","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s10115-012-0520-y","volume":"33","author":"BA Prakash","year":"2012","unstructured":"Prakash BA, Chakrabarti D, Faloutsos M, Valler N, Faloutsos C (2012) Threshold conditions for arbitrary cascade models on arbitrary networks. Knowl Inf Syst 33:549\u2013575","journal-title":"Knowl Inf Syst"},{"key":"1326_CR12","doi-asserted-by":"crossref","unstructured":"Tong H, Prakash BA, Eliassi-Rad T, Faloutsos M, Faloutsos C (2012) Gelling, and melting, large graphs by edge manipulation. In: Proceedings of CIKM","DOI":"10.1145\/2396761.2396795"},{"key":"1326_CR13","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198545996.001.0001","volume-title":"Infectious diseases of humans","author":"RM Anderson","year":"1991","unstructured":"Anderson RM, May RM (1991) Infectious diseases of humans. Oxford University Press, Oxford"},{"key":"1326_CR14","doi-asserted-by":"crossref","unstructured":"Karp RM (1972) Reducibility among combinatorial problems. In: Complexity of computer computations. Springer, pp 85\u2013103","DOI":"10.1007\/978-1-4684-2001-2_9"},{"issue":"1","key":"1326_CR15","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/BF01588971","volume":"14","author":"GL Nemhauser","year":"1978","unstructured":"Nemhauser GL, Wolsey LA, Fisher ML (1978) An analysis of approximations for maximizing submodular set functions\u2014I. Math Program 14(1):265\u2013294","journal-title":"Math Program"},{"key":"1326_CR16","doi-asserted-by":"crossref","unstructured":"Palmer CR, Gibbons PB, Faloutsos C (2002) Anf: a fast and scalable tool for data mining in massive graphs. Ser. KDD \u201902. ACM, New York, NY, USA, pp 81\u201390","DOI":"10.1145\/775047.775059"},{"issue":"2","key":"1326_CR17","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/0022-0000(85)90041-8","volume":"31","author":"P Flajolet","year":"1985","unstructured":"Flajolet P, Martin GN (1985) Probabilistic counting algorithms for data base applications. J Comput Syst Sci 31(2):182\u2013209","journal-title":"J Comput Syst Sci"},{"key":"1326_CR18","unstructured":"McDaid AF, Murphy B, Friel N, Hurley N (2012) Clustering in networks with the collapsed stochastic block model. arXiv preprint arXiv:1203.3083"},{"key":"1326_CR19","doi-asserted-by":"crossref","unstructured":"Kumar R, Novak J, Raghavan P, Tomkins A (2003) On the bursty evolution of blogspace. In: WWW\u201903, pp 568\u2013576","DOI":"10.1145\/775152.775233"},{"key":"1326_CR20","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network. In: KDD\u201903","DOI":"10.1145\/956750.956769"},{"issue":"1","key":"1326_CR21","doi-asserted-by":"publisher","first-page":"73","DOI":"10.14778\/2047485.2047492","volume":"5","author":"A Goyal","year":"2011","unstructured":"Goyal A, Bonchi F, Lakshmanan LV (2011) A data-based approach to social influence maximization. Proc VLDB Endow 5(1):73\u201384","journal-title":"Proc VLDB Endow"},{"key":"1326_CR22","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1137\/S0036144500371907","volume":"42","author":"HW Hethcote","year":"2000","unstructured":"Hethcote HW (2000) The mathematics of infectious diseases. SIAM Rev 42:599\u2013653","journal-title":"SIAM Rev"},{"key":"1326_CR23","unstructured":"Ganesh A, Massoulie L, Towsley D (2005) The effect of network topology on the spread of epidemics. In: Proceedings of INFOCOM"},{"issue":"24","key":"1326_CR24","doi-asserted-by":"publisher","first-page":"247901","DOI":"10.1103\/PhysRevLett.91.247901","volume":"91","author":"R Cohen","year":"2003","unstructured":"Cohen R, Havlin S, Ben Avraham D (2003) Efficient immunization strategies for computer networks and populations. Phys Rev Lett 91(24):247901","journal-title":"Phys Rev Lett"},{"key":"1326_CR25","unstructured":"Aspnes J, Chang K, Yampolskiy A (2005) Inoculation strategies for victims of viruses and the sum-of-squares partition problem. In: Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms, series SODA\u201905, pp 43\u201352"},{"issue":"1","key":"1326_CR26","doi-asserted-by":"publisher","first-page":"016101","DOI":"10.1103\/PhysRevE.84.016101","volume":"84","author":"P Van Mieghem","year":"2011","unstructured":"Van Mieghem P, Stevanovi\u0107 D, Kuipers F, Li C, Van De Bovenkamp R, Liu D, Wang H (2011) Decreasing the spectral radius of a graph by link removals. Phys Rev E 84(1):016101","journal-title":"Phys Rev E"},{"key":"1326_CR27","doi-asserted-by":"crossref","unstructured":"Prakash BA, Adamic LA, Iwashyna TJ, Tong H, Faloutsos C (2013) Fractional immunization in networks. In: Proceedings of SDM, pp 659\u2013667","DOI":"10.1137\/1.9781611972832.73"},{"issue":"5","key":"1326_CR28","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.3934\/mbe.2013.10.1615","volume":"10","author":"E Shim","year":"2013","unstructured":"Shim E (2013) Optimal strategies of social distancing and vaccination against seasonal influenza. Math Biosci Eng 10(5):1615\u20131634","journal-title":"Math Biosci Eng"},{"key":"1326_CR29","doi-asserted-by":"crossref","unstructured":"Khalil EB, Dilkina B, Song L (2014) Scalable diffusion-aware optimization of network topology. In: KDD 2014. ACM, pp 1226\u20131235","DOI":"10.1145\/2623330.2623704"},{"issue":"1","key":"1326_CR30","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s10115-017-1038-0","volume":"53","author":"B Saha","year":"2017","unstructured":"Saha B, Gupta S, Phung D, Venkatesh S (2017) Effective sparse imputation of patient conditions in electronic medical records for emergency risk predictions. Knowl Inf Syst 53(1):179\u2013206. https:\/\/doi.org\/10.1007\/s10115-017-1038-0","journal-title":"Knowl Inf Syst"},{"issue":"8","key":"1326_CR31","doi-asserted-by":"publisher","first-page":"e43611","DOI":"10.1371\/journal.pone.0043611","volume":"7","author":"A Patwardhan","year":"2012","unstructured":"Patwardhan A, Bilkovski R (2012) Comparison: flu prescription sales data from a retail pharmacy in the US with google flu trends and US ilinet (cdc) data as flu activity indicator. PloS ONE 7(8):e43611","journal-title":"PloS ONE"},{"issue":"6","key":"1326_CR32","doi-asserted-by":"publisher","first-page":"e1003635","DOI":"10.1371\/journal.pcbi.1003635","volume":"10","author":"JR Gog","year":"2014","unstructured":"Gog JR, Ballesteros S, Viboud C, Simonsen L, Bjornstad ON, Shaman J, Chao DL, Khan F, Grenfell BT (2014) Spatial transmission of 2009 pandemic influenza in the us. PLoS Comput Biol 10(6):e1003635","journal-title":"PLoS Comput Biol"},{"key":"1326_CR33","doi-asserted-by":"crossref","unstructured":"Malhotra K, Hobson TC, Valkova S, Pullum LL, Ramanathan A (2015) Sequential pattern mining of electronic healthcare reimbursement claims: experiences and challenges in uncovering how patients are treated by physicians. In: 2015 IEEE international conference on big data (big data). IEEE, pp 2670\u20132679","DOI":"10.1109\/BigData.2015.7364067"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-018-01326-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-018-01326-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-018-01326-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T12:48:30Z","timestamp":1720961310000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-018-01326-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,30]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1326"],"URL":"https:\/\/doi.org\/10.1007\/s10115-018-01326-x","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"type":"print","value":"0219-1377"},{"type":"electronic","value":"0219-3116"}],"subject":[],"published":{"date-parts":[[2019,1,30]]},"assertion":[{"value":"10 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}