{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:28:59Z","timestamp":1772119739844,"version":"3.50.1"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,4,1]],"date-time":"2011-04-01T00:00:00Z","timestamp":1301616000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1007\/s10878-011-9393-3","type":"journal-article","created":{"date-parts":[[2011,3,31]],"date-time":"2011-03-31T13:09:34Z","timestamp":1301576974000},"page":"374-378","source":"Crossref","is-referenced-by-count":42,"title":["The complexity of influence maximization problem in the deterministic linear threshold model"],"prefix":"10.1007","volume":"24","author":[{"given":"Zaixin","family":"Lu","sequence":"first","affiliation":[]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Weili","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Joonmo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,4,1]]},"reference":[{"key":"9393_CR1","doi-asserted-by":"crossref","unstructured":"Chen W, Yuan Y, Zhang L (2010) Scalable influence maximization in social networks under the linear threshold model. Microsoft TechReport Number MSR-TR-2010-133","DOI":"10.1109\/ICDM.2010.118"},{"key":"9393_CR2","volume-title":"The 2001 international conference on knowledge discovery and data mining","author":"P Domingos","year":"2001","unstructured":"Domingos P, Richardson M (2001) Mining the network value of customers. In: The 2001 international conference on knowledge discovery and data mining"},{"key":"9393_CR3","unstructured":"Goldenberg J, Libai B, Muller E (2001a) Using complex systems analysis to advance marketing theory development. Acad Mark Sci Rev"},{"issue":"3","key":"9393_CR4","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1023\/A:1011122126881","volume":"12","author":"J Goldenberg","year":"2001","unstructured":"Goldenberg J, Libai B, Muller E (2001b) Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark Lett 12(3):211\u2013223","journal-title":"Mark Lett"},{"issue":"6","key":"9393_CR5","doi-asserted-by":"crossref","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter M (1978) Threshold models of collective behavior. Am J Sociol 83(6):1420\u20131443","journal-title":"Am J Sociol"},{"key":"9393_CR6","first-page":"137","volume-title":"The 2003 international conference on knowledge discovery and data mining","author":"D Kempe","year":"2003","unstructured":"Kempe D, Kleinberg J, Tardos \u00c9 (2003) Maximizing the spread of influence through a social network. In: The 2003 international conference on knowledge discovery and data mining, pp 137\u2013146"},{"key":"9393_CR7","doi-asserted-by":"crossref","first-page":"1127","DOI":"10.1007\/11523468_91","volume-title":"The\u00a02005 international colloquium on automata, languages and programming","author":"D Kempe","year":"2005","unstructured":"Kempe D, Kleinberg J, Tardos \u00c9 (2005) Influential nodes in a diffusion model for social networks. In: The\u00a02005 international colloquium on automata, languages and programming, pp 1127\u20131138"},{"key":"9393_CR8","first-page":"61","volume-title":"The 2002 international conference on knowledge discovery and data mining","author":"M Richardson","year":"2002","unstructured":"Richardson M, Domingos P (2002) Mining knowledge-sharing sites for viral marketing. In: The 2002 international conference on knowledge discovery and data mining, pp 61\u201370"},{"key":"9393_CR9","volume-title":"Micromotives and macrobehavior","author":"T Schelling","year":"1978","unstructured":"Schelling T (1978) Micromotives and macrobehavior. Norton, New York"},{"key":"9393_CR10","first-page":"519","volume-title":"Lecture notes computer science","author":"F Zou","year":"2009","unstructured":"Zou F, Zhang Z, Wu WL (2009) Latency-bounded minimum influential node selection in social networks. In: Lecture notes computer science, vol\u00a05682, pp\u00a0519\u2013526"},{"key":"9393_CR11","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1142\/S1793830910000528","volume":"2","author":"F Zou","year":"2010","unstructured":"Zou F, Willson J, Zhang Z, Wu W (2010) Fast information propagation in social networks. Discrete Math Algorithm Appl 2:125\u2013141","journal-title":"Discrete Math Algorithm Appl"}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-011-9393-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10878-011-9393-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-011-9393-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T11:35:05Z","timestamp":1560080105000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10878-011-9393-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4,1]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,10]]}},"alternative-id":["9393"],"URL":"https:\/\/doi.org\/10.1007\/s10878-011-9393-3","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"value":"1382-6905","type":"print"},{"value":"1573-2886","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,1]]}}}